Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: Human Elements

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

– From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…

HAL as Your Car’s Co-Pilot

– If you recall, in my BlogInfoSec column of May 2, 2016 “Lip Reading Computers … Here Comes HAL,” I described an article about how computers were being trained to lip read and immediately related it to the treacherous lip-reading computer named HAL from the movie “2001: A Space Odyssey.”…

Campaign Lessons Learned—Part 2: Big Data vs Polls

– As children, we were frequently admonished by irate adults to “Do as I say, not as I do!” whenever we questioned why we couldn’t do what they themselves did. It was often difficult to reconcile in our own minds why there should be this dichotomy. Well, examining the results of the recent…

Auto Autos—Take the Fork

– “When you come to a fork in the road, take it” is a saying made famous by the late, great Yogi Berra. It came to mind when I saw an article “Self-driving cars reach a fork in the road, and automakers take different routes” by Ashley Halsey III and Michael Laris in the August 24, […]…

Campaign Lessons Learned—Part 1: Email Security

– Author’s note: This is the first of several columns about lessons that should have been learned from cybersecurity mistakes and nefarious activities that dominated, and likely changed the outcome of the 2016 presidential campaign. If there is one outstanding cybersecurity lesson that the U.S.…