Category Archives: CSO/CISO Perspectives

Cybersecurity vs. Convenience

– We have long recognized that adhering to stringent cybersecurity policy is not convenient for those who use systems that incorporate strong security methods. But how does convenience compare in value to the high costs and tiresome burdens emanating from security breaches, many of which could have…

What Cyber Security Can Teach Us About Preventing Mass School Shootings

– Cyber security deals with proliferation of insecure devices at a mass scale similar to the volume of guns. Cyber and physical security have overlapping protection concepts: The scale and insights of cyber illustrate why our current debate is frozen with people arguing the same tireless points that…

The Spectre of Chip Meltdown

– The latest big-time cybersecurity scare is the discovery of vulnerabilities, named Spectre and Meltdown by researchers, in many computer processors from Intel and others, which open affected processors up to exploitation by hackers who can, as I understand the situation, use those vulnerabilities…

Global Cybersecurity Standards … Another Plea

– “The Editor’s Letter,” in the May 2017 issue of the Communications of the ACM (CACM) by Moshe Y Vardi is about “Cyber Insecurity and Cyber Libertarianism.” The column is available at https://cacm.acm.org/magazines/2017/5/216316-cyber-insecurity-and-cyber-libertarianism/fulltext#…

Cybersecurity Risk Model … Implicit or Explicit Consensus?

– Whenever you engage with an online vendor or service, you must first click on the “Agree” button to indicate that you will honor the stated terms and conditions mandated by the site owner. Most individuals click the “Agree” button without thinking, knowing that activating the “Don’t…