BlogInfoSec.com

An Information Security Magazine in a Blog Format
BlogInfoSec.com RSS
  • Home
  • About
  • Advertise
  • Articles
  • Columnists
  • Contact Us
  • FAQs
  • Submissions
Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Contact Us

Please email us — minus the dashes — at

contact —a-t— bloginfosec.com

Thanks,

Team bloginfosec.com

Related Posts:

  • Surveillance, Privacy and Trust
  • Another Boeing Software “Glitch”
  • Cybersecurity Lessons from the Pandemic: Prevention
  • Cybersecurity and the Government Shutdown
  • Strong Authentication is Good, Unless ...
  • Cybersecurity Lessons from the Pandemic: Metrics and…
  • Translate Into Selected Language

    en English
    ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
  • Qualified Writer?

    Submit a Guest Article through the SUBMISSIONS link above!

    Full-Time Inquiries Contact Us: authors@bloginfosec.com

  • Categories

    • Artificial Intelligence
    • Auditing
    • Compliance and Laws
    • Contingency Planning
    • CSO/CISO Perspectives
    • Cyber-Physical Systems
    • Cybercrime
    • Cyberwarfare
    • Events
    • General
    • Human Elements
    • Information Security News
    • InfoSec Economics
    • Physical Security
    • Privacy
    • Resiliency
    • Risk Analysis
    • Security in Popular Culture
    • Security Metrics
    • software engineering
    • Technical
    • Third-Party Risk
  • "chicken little" "The Shadow Factory" "tragedy of the commons" "we never seem to learn" 2016 presidential campaign 2017 ISE Luminary Leader A.I. abend ACARS access control access management account hijacking Accudata ACF2 ACM actionable metrics Ada Adam Smith Advanced Persistent Threat AGI agility AI AI Co-Pilot AICPA aircraft safety and security air gap AI testing ALE aleatory Alex Hutton algorithms Alina Oprea Allan Pomerantz Al Pessin alternate energy sources Amazon Amazon Echo Amazon Kindle America the Vulnerable Amit Yoran Amped analytics Andrew Cuomo Andy Greenberg Andy Pasztor ANI Anish Bhimani anonymity Anton Chuvakin Antone Gonsalves Anton Troianovski Apache Apple Apple iPhone 5S application-level breaches application development application security apps APT Ari Juels Art Caviello artificial intelligence Ashley Halsey III Ashley Madison Ashley Southall asia assessment AT & T Audit authentication authentication tokens authorization auto-auto auto-auto security automated building-access systems automobiles automobile safety and security automotive vehicle systems AUTOnomous AUTOmobiles autonomous vehicles autonymous vehicles Availability Availability Heuristics aviation security avionics avionics systems avoidance awareness Awareness / Education awareness instruction awareness training Axciom backup backup and recovery backup facilities BAH Barbara Simons Bash batch production scheduling BCP 188 behavioral economics behavioral risk audit Ben Edelman Ben Worthen Bert Martin big data biometrics bionic devices BISO BitLocker BITS black swans bloginfosec Annoucements Bloomberg News Bob Lutz Boeing Boeing 737 Max book review Books on InfoSec Booz Allen Hamilton botnets bots BP breach breaches breach incidents breach notification Brewster Kahle Brian Peretti British Airways British Petroleum Bryan Ware BSIMM Budgeting for Security bureaucracy Burisma business business continuity business continunity business owner CACM Cambridge Analytica cancer research Capital One breach cars Cary R Spitzer catastrophe catastrophe planning Cathy O'Neil CCTV CDE Center for Strategic and International Studies centrifuges cerebellum CERIAS certification CF Disclosure Guidance Charles Babcock Charles Miller china ChoicePoint Christopher Condon Christopher Krebs Chris Valasek Chris Wysopal CIA CIAO CIA triad CICA CISA CISO CISO burnout CISO savvy CISO skills CISSP climate change cloud cloud-based services cloud computing cloud security Cloud Security Alliance Cloud Security Forum cloud services CNAP CNCI COBIT code coding Coding Securely / SDLC Collaboration commercial software Common Criteria Common Quality Enumeration communications complex systems compliance complicated systems Comprehensive National Cybersecurity Initiative Conferences / Events / Meetups confidentiality conflict minerals connected system Consensus Model Context Contingency Planning contingency plans continuity planning convenience vs. security copyright CoreData coronavirus coronavirus pandemic correlations COTS counterfeit counterfeit equipment COVID-19 CQE crisis management critical infrastructure critical infrastructure security cryptography crypto war CSA CSIS CSSLP CWE/SANS Cyber-Espionage Report cyber-physical systems cyber-security systems cyberassault cyber attack cyberattack cyber attacks cyber crime cybercriminals Cybergeddon cyber insurance cyber meltdown cyberpandemic cyber resiliency cyber risk cybersecurity cyber security Cybersecurity Act of 2012 cybersecurity analytics cybersecurity breaches cybersecurity communications cybersecurity engineering cybersecurity governance cybersecurity incidents cybersecurity intelligence cybersecurity metrics cybersecurity monitoring Cybersecurity National Action Plan cybersecurity research cybersecurity risk Cybersecurity Risk Model cybersecurity standards cybersecurity statistics cyberspace cyberterror cyberterrorism cyber war cyberwar cyberwarfare cyber warfare cyberwar policy Dan Geer Daniel H Wilson Daniel Kahneman Dan Schutzer DARPA data analytics data at rest data bias data breach data breaches data breach notification laws datacenters data classification data collection data destruction data erasure data falsification data handling. data destruction data in transit data leakage data leakage prevention data life cycle data loss prevention data masking data mining data obfuscation data owners data ownership data privacy data protection data sampling David Brooks David Chaum David E Sanger David Frum David Streitfeld Daylight Saving Time DBIR DCF DC Nets DDoS deceitware DECIDE model decision theory Deepa Seetharaman deep packet inspection defeat-device software Defense-in-Depth defense in depth definitions degaussing deniability Department of Defense Department of Homeland Security deterrence Devlin Barrett DHS Diffie-Hellman digital signature disaster backup disaster planning disaster recovery diversification DLP DLT DNS DoD Donald Trump Donn Parker Don Strumpf Douglas Hubbard DR/BC Dreamliner driver-assist technologies driverless driverless vehicles DSS Dyn earthquake Echo Show economics of security Ed Amoroso education Edward J Markey Edward J Snowden Edward Snowden EID Einstein electric cars electric vehicles electromagnetic pulse electromagnetic pulse attack Elinor Mills Elon Musk email EMP employment Encryption end-point security end-user security Engineering Safe and Secure Software Systems Enginnering Safe and Secure Software Systems ENISA Enterpise Information Security and Privacy Enterprise Information Security and Privacy EPA epistemic Equifax breach equipment Eric Taub Erik Hollnagl ethical hacking EU Eugene Spafford evidence expected utility expected value expert systems Exploit Code / Malware exploits FAA face-recognition facebook FAIR fake fake news Farhood Manjoo Farjad Manjoo FBI featured FFIEC Fiat Chrysler FileVault Finn Partners Firmware Fitbit Flight MH370 flying taxis Ford Foremski forensics Forensics / Incidents Forrester Consulting FOSS Frank Bruni FRAP fraud Fredrik Dahl free access FreeBSD Project FS-ISAC FS-ISAC at Twenty FS/ISAC FSL FSSCC FSSCC-FBIIC FST FSTC FUD FUD Theater Fukushima functional safety functional safety testing functional security testing GAISP GAO GAPP Gary Hinson Gary McGraw GE General Motors geo-tracking Germanwings A320 Airbus GLBA global cybersecurity pact global cybersecurity standards global standards GM Google Google Home Google Plus governance government GPS Gramm-Leach-Bliley Gramm-Leach-Bliley Act Gregg F Bartley Greg Shipley grid dependency Gulf oil disaster hack hacked hackers hacking hacks HAL Handbook of Research on Social and Organizational Liabilities in Information Security hardening hardware Harold Thomas Martin III hash hazard risk analysis Heartbleed Heartland Payments Heartland Payment Systems high-integirty safety-critical software systems HIPAA Hiroka Tabuchi historical analysis HOB-SSL Homeland Security honeynet honeypot Howard Schmidt HP HP LaserJet printer HTC Droid Incredible Phone Huawei Hugo Teso Human Elements human factors Hurricane Katrina hurricane metrics hurricanes Hurricane Sandy IAM IBM ICE ICS ICSA Labs identification identity and access management identity loss identity management identity theft IDM IDS ID theft IE IEC 61508 IEEE IEEE Security & Privacy IEEE Xplore IETF IIO illusion of validity in-vehicle systems incident incident reporting incidents inductive logic Industrial Control Systems Industry Commentary information classification information risk information risk management Information security information security as business enabler information security governance information security incidents information security management information security metrics information security outsourcing information technology supply chain Information Tehcnology Industry Council infrastructure innovation insiders insider threat insourcing integrated circuits integrity Intel Intercontinental Exchange Internet banking Internet Explorer Internet of Things intersubjective interval scale Interviews inventory systems IOC IoT IoTA IOT Internet of Things IoTR iPad iPhone iPhone app IPL IPS Iran IRM ISA 99.02.01 Isaac Asimov ISAC ISACA ISAO ISC2 ISE Luminary Leader ISO 26262 ISO 27001 ISO certification ISO compliance ISSA iSuppli ISV ITI ITPF Jack Hitt Jack Welch Jacob Appelbaum James Bamford Japan Jason Healey Jay Lala jeep Jeffrey Immelt Jennifer Bayuk Jesse Eisinger Jim Goodnight Jim Reavis Jobs in Information Security Joel Brenner Joe Weiss John Breit John Marien John Markoff Johnny Long John Villasenor Joseph Garcia Joseph Menn JPMorgan JP Morgan Chase Julian Assange Julie Creswell Karl Brauer Kate Matsudaira KCG Ken Belva keylogging Kik Knight Capital Group knowability KPMG lab certification Lance Hayden Larry Summers law law firms leadership Legal & Regulatory Issues lifecycle Lily May Newman LIPA lip reading LISAT Lockheed Lockheed Martin logging logical Lord Kelvin machine learning mainframes malicious insider malware malware infection management-technology gap Managing the Risks of Cyber-Physical Systems Mandiant manual backup Mark Zuckerberg Mary Ann Davidson Maylasia Airlines flight MH370 medical identity theft medical insurance Melissa Hathaway men-in-the-middle attack MERgE Safety and Security Partners metadata metrics MH370 Michael Bloomberg Michael Fox Michael Laris Michael Lesk Michael Lewis Michael McConnell Michael Riley microsoft Mike Isaac Milton Friedman Mint.com MITRE ML Mobileye models monitoring monoculture Monte Carlo moral hazard Moshe Y Vardi Moti Yung MSSP Mukul Pareek Nagoya Institute of Technology Nancy G Leveson Nancy Leveson Nanex Group NASA NASDAQ Nasim Nicholas Taleb Nassim Nicholas Taleb Natasha Singer Nate Silver Nathaniel Rich National Council of ISACs national security National Security Agency National Security Council nation states NATO NCICC NEDC negative-pressure negative testing network network resiliency News Commentary Newt Gingrich NIC Nick Bilton Nicole Perlroth NIST NIST Cyber Security Framework no-charge access Noam Cohen non-objective non-public personal information nonfunctional security testing nonpublic personal information North Korea No Tech Hacking NPPI NSA nuclear power plant meltdown Nudge numerical Nvidia NYSE objective objective risk OCTAVE Office of Personnel Management Office of Technology Assessment offshoring Oliver Sachs one-time passwords online identity onshoring OnStar open access Open Source open source code open source software Open SSL OpenSSL OPM OPM breach Orion OTA outsourcing Outsourcing Information Security overconfidence overwriting OWASP pandemic Paris attacks PARIS CALL password passwords Patching Paul Ford Paul Krugman PCCIP PCI PCI DSS PDD-63 Penetration Testing Pentium people-process-technology performance metrics perimeter personal personal data personal information personalizing risk personally identifiable information personal safety Peter Tippett Philip Fernbach Phishing Phyllis Schneck Physical Security PII platform security Playstation PMI point of entry Policies and Procedures Ponemon Institute portable devices potential security compromise Poul-Henning Kamp President's Identity Theft Task Force Presidential Decision Direction 63 President Obama prevention printers PRISM Privacy privacy paradox privacy regulations Privacy Rights Clearinghouse privacy risk privacy v security PrivaTegrity private sector privileged access probability probability calculus probability theory process propensity Protection pseudonymity pump-and-dump QD-V qualitative quantiative quantitative quantum computing Quantum Dawn RACF Ralph Langner Ralph Merkle Rana Foroohar Randall Stross Randy Sabett ransom payments ransomware real v. perceived risk recall Recency Bias recovery Red Flags Red Flags Rule regulations reliability reputational risk research research and development research methodology reshoring resiliency Reverse Engineering Richard A. Clarke Richard Bejtlich Richard Clarke Richard Seiersen Richard Thaler risk Risk Analysis risk assessment risk management risk managment risk metrics risk models risk nexus risk scoring Robert K. Knake Robert M Slade Robert Thibadeau Robert Westervelt Robin Bloomfield Robin K Hill robotics robots ROI Ron Lieber Ron Ross ROSI ROSI Security RSA RSA breach RSA Conference Russia Russian Federation Russian hacks S4E SAE Level 5 automation SAFE 2013 safe and secure cyber-physical systems safety safety-critical software systems safety-critical systems safety-security software gap safety and secuirty engineering Safety and Security Engineering V safety integrity level safety technology safety v security SAI SANS Santa Fe Group sarbanes-oxley SAS 70 SASO SAST SB 1386 SCADA systems Schneider Electric Scott Borg SCRM SDL SDLC SEC secondary suppliers secrecy secure coding secure development secure software system development lifecycle Secure Software Systems Engineering SecurID Security security-critical security-critical software-intensive systems security-privacy security and privacy security and safety security and saftey co-engineering security awareness Security Breaches security economics Security Innovation Network security intelligence Security Metrics security research security testing security tools self-awareness self-driving self-driving cars self-driving technology self-driving vehicles service providers sharing economy Sharkbot Shawn Henry Sheelah Kolhatkar Shellshock SIAC SIEM SIL SINET Siobhan Gorman SIRO smart-road infrastructure smart grid smartphones smart phones SMB Snapchat Snowden Social Engineering social media soft skills software software assurance Software Assurance Initiative software development lifecycle software disposal software engineering software inventory software monocultures software recall software resiliency software safety engineers software security software security assurance software testing solar power SolarWinds Solutions / Workarounds Sony source code south korea SOX SPAM Spanair plane crash Spectre and Meltdown spoofing spotight SQL Injection SQL Injection Attack SSAE-16 SSDLC standards Stash Jarocki statistics Stephanie Armour Stephen Hawking Steve Katz Steven Brill Steven Sloman STPA strong auhentication strong passwords structured data Stuxnet subjective subjective risk subjectivity successful behaviors Supervisory Control and Data Acquisition Systems supply-chain redundancy supply-chain risk manaagement supply chain supply chain risk supply chains surveillance survivability SwA SwAMP sysadmin system system component System Development Lifecycle system equilibrium systems engineering Tad Friend Takata Takata airbags tamper evident tamper proof tamper resistant Tech User Responsibility TEPCO Tesla Tesla accident testing The Black Swan The Butterfly Effect The Fifth Domain The Fifth Risk The Wall Street Journal third-party breach third-party governance third-party risk threats TISO Tom Chatfield Tools TopSecret Tor Touch ID Toyota tragedy of the commons train crash training train wreck transponder Trending Topics Triton malware TruSecure tsunami Turing Awards two-factor authentication Typhoon Haiyan U.S. Chamber of Commerce U.S. Cyber Consequences Unit U.S. election U.S. elections U.S. Highway Trust Fund Uber UDID Ulster Bank unauthoized disclosure Uncategorized uncertainty unemployment Unix unstructured data V & V validation value vehicle-to-infrastructure vehicle-to-vehicle vehicle-to-vehicle systems vehicle cybersecurity vehicle hacking vehicle security vendor management vendor risk Veracode verification verification and validation Verizon DBIR Vinton G Cerf Virginia Heffernan virtualisation virtualization Virtual Trust Viruses / Worms Volkswagen vulnerabilities vulnerability vulnerability assessment vulnerability assessments Vulnerability Commentary Vulnerability Disclosure VW VW case Wall of Constricted Thinking Wall Street Journal Weapons of Math Destruction web applications White House Wikileaks William Forstchen William R. Forstchen William T Vollman William Young Wireless Wireless Client Wireless Discussion Wireless Security Wireless Vulnerability Discussion WSJ Y2K Y2K hoax Y2020 Yik Yak Yoo Hoo Zeljka Zorz zero-trust security ZTE
© 2021 BlogInfoSec.com. All rights reserved. | Privacy | Terms of Service