Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: Security in Popular Culture

Campaign Lessons Learned—Part 1: Email Security

– Author’s note: This is the first of several columns about lessons that should have been learned from cybersecurity mistakes and nefarious activities that dominated, and likely changed the outcome of the 2016 presidential campaign. If there is one outstanding cybersecurity lesson that the U.S.…

Alleged Russian Hacks … Is This Cybersecurity’s Tipping Point?

– The Washington Post, in a December 9, 2016 article “Secret CIA assessment says Russia was trying to help Trump win White House” by Adam Entous, Ellen Nakashima and Greg Miller, leaked a CIA report claiming that the Russians had manipulated the U.S. election by hacking into both Democratic and…

Is Risk Avoidance the Key?

– My answer to this question is a resounding “yes.” But I don’t think that is the general view of cybersecurity professionals. After all, if business, government and other organizations pursued such a course, what would remain for cybersecurity folks to do? If you avoid the risk, then you…

Yik Yak Kiks Back—Privacy vs. Anonymity Revisited

– In 1958, The Coasters sang the song “Yakety Yak,” … listen at https://www.youtube.com/watch?v=9xAi80ShG0I  The lyrics are about a domineering parent ordering a kid around, threatening him or her, and saying “Don’t talk back,” when the kid retorts “Yakety Yak.” In the 1950s…

Juiced Beetle Not a Bug – Intentional Malware

– An editorial column in the September 24, 2015 Wall Street Journal had the title “The VW Emission Bug.” The “defeat-device” software, which Volkswagen confirmed that they had installed in some of their diesel cars, certainly wasn’t a bug, as my October 5, 2015 BlogInfoSec column “When…