Tag Archives: IAM
Cybercriminals’ Motivations during Catastrophic Times
March 23, 2020 – 6:00 am
–
Brittany Haynes wrote an article about “How Criminals Are Benefitting From the COVID-19 Crisis” on March 19, 2020, which is available at…
Cybersecurity and the Government Shutdown
March 25, 2019 – 6:00 am
–
I had originally thought of comparing the impact on cybersecurity of the December 2018/January 2019 35-day partial government shutdown to other forms of upheaval, bringing in references to my chapter “IAM Risks during Organizational Change and Other Forms of Major Upheaval,” in Digital…
Campaign Lessons Learned—Part 3: Authenticity, Authority and Access
May 1, 2017 – 6:00 am
–
From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…
Data Masking: Good … Information Masking: Very Bad
July 20, 2015 – 6:00 am
–
As we learn more and more about the huge data breach of the U.S. Office of Personnel Management (OPM), two aspects are grabbing everyone’s attention. One is the weakness of the security measures implemented by OPM and its contractors; the other is that senior management of OPM and purportedly…
Aircraft Safety … And Security
May 12, 2015 – 6:00 am
–
There was once a time when aircraft crashes appeared to be due mostly to mechanical failures or malfunctioning aircraft control systems. Yes, some incidents were caused by terrorists, and there were some accidents due to “human error,” but a goodly number of those also had system and/or…