Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Y2K

Cybersecurity—Eliminating Vulnerabilities and Weaknesses at the Source: A Comparison with Malaria … and Ebola

– It has always bothered me that infosec professionals spend so much of their time chasing around after threats and vulnerabilities, many of which could have been avoided if only suitable requirements, design and hygiene had been observed at the outset. While this might seem like a simple concept,…

Beating Around the Proverbial Cybersecurity Bush

– If I’ve said it once, I’ve said it a thousand times … until we put real teeth into cybersecurity enforcement and insist upon serious personal legal consequences for those at the top, we won’t see improvement. We’ve beaten around the bush for far too long. How many more breaches,…

TEOTWAWKI and the Real Y2K Story

– Whether or not you believed that the end-of-the-world was going to happen on December 21 or December 24, 2012 due to the Mayan calendar ending on one of those days, it is clear now that anticipated catastrophic events did not come to pass. Some commentators suggested that the dire warnings were…

Storing Books against Digital Disaster

– It was interesting to read that there is an effort to store physical books so that they will be available in the event that there is a catastrophe that might wipe out all electronic versions or in case the Library of Congress were destroyed. In an article by David Streitfeld, “In a Flood Tide of…

Y2K – Event, Nonevent? – Which Was It?

– The largely successful remediation of the Y2K “bug” arguably led to the worst of outcomes for the credibility of cybersecurity risk. Many believe that Y2K was all a hoax perpetrated by software consultants and vendors in order to generate income, which it certainly did. Others, who had a…