Tag Archives: spotlight

Strong Authentication is Good, Unless …

– … it results in your being arrested! In her September 28, 2019 article, “Army communication head at Mar-a-Lago sentenced for lying,” Jane Musgrave describes how an army officer in charge of communications at Mar-a-Lago had lied about posting a photograph of a young girl on a Russian…

Another Fifth … Quantum Dawn Cybersecurity Exercise

– Another Fifth … Quantum Dawn Cybersecurity Exercise Following my BlogInfoSec column “Taking the Fifth …” posted on October 29, 2019, I came across other “fives,” the most relevant of which was about Quantum Dawn V, which took place on November 7, 2019. This is the  fifth in a…

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

– It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surprised when someone pushed back on such a statement…

Taking the Fifth …

– “The Fifth Domain” is a recent book by Richard A. Clarke and Robert K. Knake. It is about cybersecurity and how it has become the fifth military domain following land, sea, air and space. Except that it isn’t really, n’est-ce pas? While intellectually one can imagine a fifth domain, it’s…

Pretending about Cybersecurity Risks

– I have written a couple of columns comparing cybersecurity risk management to managing climate change—one with the title “Cybersecurity Climate Change” (December 10, 2018), and the other “The Cybersecurity Paradox” (June 19, 2019)—and here’s another column on the topic. It was…