Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: spotlight

Security and Safety Co-Engineering Revisited

– There are those who denigrate such websites as ResearchGate and Academia.edu because they are for-profit, which is a discussion that I will not get into here. If this particular argument is of interest to you, you should read the Discover magazine piece “Who Isn’t Profiting Off the Backs of…

Cybersecurity’s “Forward to the Past”

– On June 21, 2017, Congress received a letter from 103 eminent cybersecurity experts and researchers (the list was compiled by NEDC (The National Election Defense Coalition) and partners) about reducing election hacking risks. You can link to the letter via Zack Wittaker’s article “Security…

Conflict vs. Consensus Cybersecurity Risk Models

– I gave a presentation at the end of April 2017 on “A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety” at the IEEE Homeland Security Technology Conference. The topic occurred to me when reading a quote by Brookings Institute Fellow, Susan Hennessey, as follows: “We could…

Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

– On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with the “Best Applications Track Paper” award, at the IEEE Long Island Systems, Applications…

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

– From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…