Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: spotlight

Cybersecurity Risk Metrics … Why Don’t They Get It?

– The problem with cybersecurity is the metrics that are used to assess and manage security risks. In November 2008, I published an article “Accounting for Value and Uncertainty in Security Metrics,” in ISACA Journal, which subsequently won the 2009 Michael P. Cangemi Best Book/Best Article…

HAL as Your Car’s Co-Pilot

– If you recall, in my BlogInfoSec column of May 2, 2016 “Lip Reading Computers … Here Comes HAL,” I described an article about how computers were being trained to lip read and immediately related it to the treacherous lip-reading computer named HAL from the movie “2001: A Space Odyssey.”…

IoTR, IoTA, Cybersecurity and Safety

– John Markoff wrote a column “Shhh! That Helpful Robot May Pose a Security Risk” on page B6 of the March 2, 2017 New York Times, in which he warned that the security firm, IOActive, had uncovered “[s]ignificant security flaws … in an examination of six home and industrial robots,”…

Do You Care One IoTA? You Should!

– Although you may want to admit it, it is true that your automobile is becoming a “thing” as far as the Internet is concerned. Self-driving vehicles are placed firmly within the Internet of Things (IoT), so why not create a subcategory, IoTA, the Internet of Things Automotive? After all, the…

Campaign Lessons Learned—Part 2: Big Data vs Polls

– As children, we were frequently admonished by irate adults to “Do as I say, not as I do!” whenever we questioned why we couldn’t do what they themselves did. It was often difficult to reconcile in our own minds why there should be this dichotomy. Well, examining the results of the recent…