Tag Archives: Y2K

Cybersecurity Lessons from the Pandemic: Avoidance

– There are a number of confusing differences of opinion with respect to handling the COVID-19 pandemic. Some of the confusion seems to center around a common misunderstanding of the roles of various mitigation approaches. Perhaps this is a case where those managing the pandemic could benefit from…

Y2K … Two Decades Later

– Why didn’t I use the title “Y2K at Twenty” for this column to match “The FS-ISAC at Twenty” that was posted on BlogInfoSec on January 6, 2020? Good question … easy answer. Because The New York Times commandeered “Y2K @ 20” for their online presentations. I will get to one of…

Alleged Russian Hacks … Is This Cybersecurity’s Tipping Point?

– The Washington Post, in a December 9, 2016 article “Secret CIA assessment says Russia was trying to help Trump win White House” by Adam Entous, Ellen Nakashima and Greg Miller, leaked a CIA report claiming that the Russians had manipulated the U.S. election by hacking into both Democratic and…

Cybersecurity—Eliminating Vulnerabilities and Weaknesses at the Source: A Comparison with Malaria … and Ebola

– It has always bothered me that infosec professionals spend so much of their time chasing around after threats and vulnerabilities, many of which could have been avoided if only suitable requirements, design and hygiene had been observed at the outset. While this might seem like a simple concept,…

Beating Around the Proverbial Cybersecurity Bush

– If I’ve said it once, I’ve said it a thousand times … until we put real teeth into cybersecurity enforcement and insist upon serious personal legal consequences for those at the top, we won’t see improvement. We’ve beaten around the bush for far too long. How many more breaches,…