Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: Security in Popular Culture

Is Risk Avoidance the Key?

– My answer to this question is a resounding “yes.” But I don’t think that is the general view of cybersecurity professionals. After all, if business, government and other organizations pursued such a course, what would remain for cybersecurity folks to do? If you avoid the risk, then you…

Yik Yak Kiks Back—Privacy vs. Anonymity Revisited

– In 1958, The Coasters sang the song “Yakety Yak,” … listen at https://www.youtube.com/watch?v=9xAi80ShG0I  The lyrics are about a domineering parent ordering a kid around, threatening him or her, and saying “Don’t talk back,” when the kid retorts “Yakety Yak.” In the 1950s…

Juiced Beetle Not a Bug – Intentional Malware

– An editorial column in the September 24, 2015 Wall Street Journal had the title “The VW Emission Bug.” The “defeat-device” software, which Volkswagen confirmed that they had installed in some of their diesel cars, certainly wasn’t a bug, as my October 5, 2015 BlogInfoSec column “When…

When is a Glitch Not a Glitch?

– … When it’s not a “minor malfunction” or “a minor problem that causes a temporary setback.” (per Webster’s dictionary). There was nothing minor about the four hours of downtime of an air traffic control system that caused a “major” disruption of military and civilian air…

InfoSec R.I.P.

– I recently had an experience that helped to confirm my skepticism about the accuracy of information on the Internet. I happened to be surfing the Web to find out what an internationally-known InfoSec colleague has been up to lately. Imagine my shock when his Wikipedia page indicated that he had…