Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: spotlight

Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

– On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with the “Best Applications Track Paper” award, at the IEEE Long Island Systems, Applications…

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

– From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…

Cybersecurity Risk Metrics … Why Don’t They Get It?

– The problem with cybersecurity is the metrics that are used to assess and manage security risks. In November 2008, I published an article “Accounting for Value and Uncertainty in Security Metrics,” in ISACA Journal, which subsequently won the 2009 Michael P. Cangemi Best Book/Best Article…

HAL as Your Car’s Co-Pilot

– If you recall, in my BlogInfoSec column of May 2, 2016 “Lip Reading Computers … Here Comes HAL,” I described an article about how computers were being trained to lip read and immediately related it to the treacherous lip-reading computer named HAL from the movie “2001: A Space Odyssey.”…

IoTR, IoTA, Cybersecurity and Safety

– John Markoff wrote a column “Shhh! That Helpful Robot May Pose a Security Risk” on page B6 of the March 2, 2017 New York Times, in which he warned that the security firm, IOActive, had uncovered “[s]ignificant security flaws … in an examination of six home and industrial robots,”…