Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: General

InfoSec R.I.P.

– I recently had an experience that helped to confirm my skepticism about the accuracy of information on the Internet. I happened to be surfing the Web to find out what an internationally-known InfoSec colleague has been up to lately. Imagine my shock when his Wikipedia page indicated that he had…

You Say “ISAC,” I Say “ISAO”

– The White House sponsored a “Summit on Cybersecurity and Consumer Protection” at Stanford University on Friday the 13th of February, 2015 to discuss privacy, data protection and public-private cyber-threat information sharing. They invited the CEOs of major companies. Google, Facebook, Amazon…

Did Markey Miss the Mark on Vehicle Hacking?

– The staff of Edward J. Markey, U.S. Senator for Massachusetts, issued a report on February 10, 2015, called “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk,” which is available at…

Are Social Media Bots “Good”?

– I found it really eye-opening to read Nick Bilton’s article “Phony Friends, Real Profit” which appeared on page E2 of The New York Times of November 20, 2014, and seems to be in favor of using bots to represent fakes. Either Bilton was writing with his tongue in his cheek or, if not, was…

Putting Application Security into Context

– For some time now, I have wondered why InfoSec practitioners are paying so little attention to context with respect to application security and why InfoSec professionals and software safety engineers do not collaborate as much as they should. Then I read a column on the Op Ed page of The New York…