Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: General

You Say “ISAC,” I Say “ISAO”

– The White House sponsored a “Summit on Cybersecurity and Consumer Protection” at Stanford University on Friday the 13th of February, 2015 to discuss privacy, data protection and public-private cyber-threat information sharing. They invited the CEOs of major companies. Google, Facebook, Amazon…

Did Markey Miss the Mark on Vehicle Hacking?

– The staff of Edward J. Markey, U.S. Senator for Massachusetts, issued a report on February 10, 2015, called “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk,” which is available at…

Are Social Media Bots “Good”?

– I found it really eye-opening to read Nick Bilton’s article “Phony Friends, Real Profit” which appeared on page E2 of The New York Times of November 20, 2014, and seems to be in favor of using bots to represent fakes. Either Bilton was writing with his tongue in his cheek or, if not, was…

Putting Application Security into Context

– For some time now, I have wondered why InfoSec practitioners are paying so little attention to context with respect to application security and why InfoSec professionals and software safety engineers do not collaborate as much as they should. Then I read a column on the Op Ed page of The New York…

The Threat of Artificial Intelligence

– In a recent column I argued that general columnists, such as David Brooks, don’t understand enough about certain technologies, such as artificial intelligence (AI), to assess their impact properly. As a result AI is considered by the general public to be much more benign than some technologists…