Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: Privacy

Conflict vs. Consensus Cybersecurity Risk Models

– I gave a presentation at the end of April 2017 on “A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety” at the IEEE Homeland Security Technology Conference. The topic occurred to me when reading a quote by Brookings Institute Fellow, Susan Hennessey, as follows: “We could…

HAL as Your Car’s Co-Pilot

– If you recall, in my BlogInfoSec column of May 2, 2016 “Lip Reading Computers … Here Comes HAL,” I described an article about how computers were being trained to lip read and immediately related it to the treacherous lip-reading computer named HAL from the movie “2001: A Space Odyssey.”…

Campaign Lessons Learned—Part 2: Big Data vs Polls

– As children, we were frequently admonished by irate adults to “Do as I say, not as I do!” whenever we questioned why we couldn’t do what they themselves did. It was often difficult to reconcile in our own minds why there should be this dichotomy. Well, examining the results of the recent…

Campaign Lessons Learned—Part 1: Email Security

– Author’s note: This is the first of several columns about lessons that should have been learned from cybersecurity mistakes and nefarious activities that dominated, and likely changed the outcome of the 2016 presidential campaign. If there is one outstanding cybersecurity lesson that the U.S.…

Techies, Newbies and the Preservation of Privacy

– No sooner had I submitted my May 30, 2016 “Facebook Fallibility—Algorithms vs. Judgement vs. Ourselves” BlogInfoSec column about Facebook having used newbies to select items for “Trending Topics” than Jim Rutenberg published an article, “Facebook’s Troubling One-Way Mirror,” on the…