Did NIST Plagiarize My Security-Privacy Venn Diagram?

– .. or did I copy theirs? Or did someone else come up with it before either of us did? Nowadays, it’s really hard, if not impossible, to determine which came first. All I know is that the Venn diagram, which shows the intersection between privacy and security, and which is Figure 1 in my article…

Orwellian Behavioral Economics and Privacy Risk

– Recently, I have been looking into behavioral economics. I strongly believe that conclusions from research in this area might well be applicable and contribute significantly to our understanding of cybersecurity risk management. The underlying premise of behavioral economics, which arose from the…

The Spectre of Chip Meltdown

– The latest big-time cybersecurity scare is the discovery of vulnerabilities, named Spectre and Meltdown by researchers, in many computer processors from Intel and others, which open affected processors up to exploitation by hackers who can, as I understand the situation, use those vulnerabilities…

Privacy and the Sharing Economy

– In a previous column, I mentioned a talk with the title “Cybersecurity Challenges of Systems-of-Systems for Fully-Automated Road Vehicles,” which I delivered on November 8, 2017 at the 2017 CEWIT (Center of Excellence Wireless and Information Technology) Conference in Stony Brook, New York. In…

Is Secrecy Over?

– Is this not an incredible question? We’ve been bombarded over the past couple of decades with numerous cases of privacy compromise. But secrecy! Is nothing sacred anymore? Not if you read the November 12, 2017 New York Times article “Security Breach and Spilled Secrets Have Shaken the N.S.A.…