Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: spotlight

Alleged Russian Hacks … Is This Cybersecurity’s Tipping Point?

– The Washington Post, in a December 9, 2016 article “Secret CIA assessment says Russia was trying to help Trump win White House” by Adam Entous, Ellen Nakashima and Greg Miller, leaked a CIA report claiming that the Russians had manipulated the U.S. election by hacking into both Democratic and…

BAH, BAH, Black Sheep

– Two strikes against BAH (Booz Allen Hamilton)! First, Edward Joseph Snowden. Second, Harold Thomas Martin III. Both BAH contractors working for the NSA (National Security Agency). Will another strike against BAH mean that they are out … out of the cybersecurity contracting business, that is? No,…

Is Risk Avoidance the Key?

– My answer to this question is a resounding “yes.” But I don’t think that is the general view of cybersecurity professionals. After all, if business, government and other organizations pursued such a course, what would remain for cybersecurity folks to do? If you avoid the risk, then you…

Security Metrics, Recency Bias and Availability Heuristics

– I “recently” came across an article by Tom Chatfield with the title “The Trouble with Big Data? It’s Called The ‘Recency Bias,’” which is available at http://www.bbc.com/future/story/20160605-the-trouble-with-big-data-its-called-the-recency-bias The article was published on June 5,…

Algorithms and Risk Profiling

– I had begun this column a couple of months ago, but was diverted to other topics. What brought me back to the subject was a column by Sheelah Kolhatkar with the title “Higher Mathematics – Algorithm Blues” in “The Talk of the Town” section of The New Yorker of October 10, 2016. The…