The Semantics Of Passwords
Beyond The Political
Politics is one of those topics best avoided among polite company, and this post in no way espouses particular views or partisan sentiments. It is difficult to talk about federal efforts to enhance cybersecurity without drawing attention to national politics, but that is what we hope to do. (more…)
Riding Along On Easy Street
The Swede Smell Of Cyber
Cat Stevens: Cybersecurity Hero
You Have The Power, Mostly
Just when you thought it was safe to go back in the water, Russian hacking resurfaces in waters beyond the political. Sure, it was devastating when we realized that Russia had wormed its way into our electoral and democratic process, but that was apparently just the beginning of the story. (more…)
The Future of Cyber- Part Two
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has some interesting perspectives on the nature of cyber threats going forward. The concept of deterrence, for example is complicated, at least on a national or global scale. “Deterrence requires attribution supported by evidence, further supported by classified information and practices,” Zheng suggests, and governments know that for every action there is a reaction, often deploying the same technology. So global resolution of cyber threat potential seems problematic.
The Future of Cyber- Part One
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has also worked as a senate staffer on the Homeland Security Committee, in the Computer Associates software engineering process, and, most recently, on cyber moonshots at DARPA. So her perspective on cyber reflects and informs those of consumers, governments, and leading edge developers. (more…)
Marsha Marsha Marsha!
The Smaller They Are, The Harder They Fall
No Such Thing As A Free Lunch
It’s A Family Affair
Hacking Up Your Tex-Mex
Camp Songs For IT Professionals
It’s summertime, and the livin’ is easy. Fish are jumpin’, and the cotton is high. If you’re lucky, the old memories from summer camp return to the fore, as nostalgia delivers you from the daily stress of network security and constant threats.
The Business Side Of Cyberthreats
When Cybersecurity Is Mainstream
Hacking Ain’t What it Used to Be
Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t kept up with the rapid pace of technological innovation. After all, ARPANET was in its infancy in 1983, and the World Wide Web wouldn’t become a consumer reality until around 1990. Protecting isolated computers is a wildly different thing from keeping networked devices secure in the IOT world. (more…)
The Imperfect Storm
There’s a storm brewing, potential chaos lurking in the wings. And I’m not talking about politics. Though, if we’re being honest, there’s a storm brewing there, too. We can argue cause and effect, but the world is changing in palpable ways, probably more rapidly than we imagine. (more…)
When The Chips Are Down
Arraigned On The Planes Of Spain
Back when Julie Andrews was in her theatrical prime, there was more than just The Sound of Music in the hills. In My Fair Lady, she repeated “the rains in Spain stay mainly on the plains” in an effort to lose her cockney accent. One could argue that Eliza Doolittle was trying to escape her past and enjoy the liberty associated with a new identity, a new language, a new sense of freedom. The same might be said of Peter Yuryevich Levashov, a Russian hacker whose fingerprints are said to be found on such exploits as the Russian intrusion into our 2016 elections. (more…)
Not What You Think It Is
Some things are exactly what you expect. A ballpene hammer, for example, is difficult to mistake for anything else. But if someone hammers your online presence, littering comment and review boxes with inaccurate characterizations of your business, the picture seen by your customers and prospects is very different from what you might imagine. (more…)
Introverted Social Media
Even if we could isolate the recent activity of Russian hackers, imagine a mainstream marketplace for nefarious services provided by invisible people paid in Bitcoin.The information you seek is mined from the personal profiles and accounts of your target audience, whether that audience is a cheating spouse or a rebellious teenager with a hidden social media presence. It’s a complete violation of privacy, and we feed our own vulnerability with every trace of our digital footprint. (more…)
Is That Toaster Listening To Us?
In the interest of your organization’s OPSEC, step away from the microwave before you answer this question. There is no telling who might be listening right now. And if you’ve ever had Russian dressing on your salad, be sure you state that explicitly. Denial is not just a river in Egypt. Here’s the question: How confident are you that your cybersecurity practices are up to speed? (more…)
Who’s Baking Your Cookies?
So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the Internet. (more…)
Who’s Watching The Watchers?
It’s been a strange month or two in the world, and that’s not simply a political statement. There is a very real sense that somebody’s watching, all of us, all the time, and that we should take that for granted. Increasingly, it seems, that voyeurism extends beyond our digital footprint and into our everyday physical spaces. While novelists and science fiction authors have been seizing on the approach of these days for decades, the Luddites are always the last to know. But, you might ask, who is watching the watchers? Apparently, that would be Wikileaks. (more…)
Now You See It, Now You Don’t
Stand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by phishing your account information to unlock, wipe, and resell the phone. By standing against the wall, you limit the access and cover your blind side. Sadly, the stories are anything but rare. (more…)
Bundle Up To Avoid The Cold
With every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating our elections. Though we could debate the extent of the success, nobody seems to doubt the intent any longer. If those chilly diplomatic breezes seem to intimate a second cold war, will cyber be the weapon of choice? Is it already?
A Cyberhand On Your Wallet
Either way, you’re building value through your network and data and making a good faith effort to protect those valuable assets. You’ve got an IT staff, maybe, or a CTO that knows your infrastructure like the back of his hand. You know the value that your network and data add to your balance sheet, even if they’re not explicitly listed there. But sometimes a little clarity is helpful.
Ransomware Is Not Randomware
After being hit three times in the last year, a luxury hotel in Austria is tired of paying a ransom to get its data back. The Romantik Seehotel, according to Motherboard, recently paid about $1,600 in Bitcoin to regain access to its computers and data. At the heart of the issue was their inability to create the magnetic key cards that have become all but ubiquitous in today’s hotel experience. Again, the third time seems to be the charm, because the hotel owners have reported that they will be converting the security system back to old school locks and keys as a result of this third ransomware event. (more…)
A Secret History of Bad Relationships
Have you ever been THAT guy, the one who is only trying to be honest when everybody turns to him to point out the flaws in the system? You’re the one who remembers the office party everybody else wants to forget, down to the details that are all but lost to the ages. You’re there to remind Chuck in Sales & Marketing that numbers are down and click-throughs and conversions are sure to follow, even when Chuck didn’t ask. What? It’s the truth. You’re just putting it out there. Now imagine you simply harbored all this information and people sought you out and analyzed your memories. (more…)
Bold New World
Cybersecurity is approaching oxygen and water on the list of things we need to survive in this crazy world of ours. The threats are very real, whether deployed by governments around the globe or 400-pound hackers in their bed or the window booth at the corner coffee shop. The technology we create to make our lives easier now requires extraordinary vigilance, but it’s not the machines we should fear, as science fiction writers originally thought. The biggest threats seem to be the humans manipulating the good technology for bad purposes, and we can never completely isolate ourselves from them. Or can we? (more…)
Wait, Is It Monday Already?
Cyber Monday. The masterful creation of marketing professionals, designed to tap your wallet before the turkey and dressing settle in your tummy. Think of the sheer volume of sensitive consumer information that wafted through the ether on that day, searching out bargains and tantalizing hackers. Imagine the millions of people walking through a big mall with their purses and wallets wide open and you begin to get the picture. But who doesn’t love a deal? And in today’s digital, global, Internet-of-Things, consumption-driven economy, who are we to argue with the ease with which we transact? Apparently 2016 set a new record for cyber-grab. Go team! (more…)
Blue Skies and Fireflies
If you have flown lately, you might have noticed a new wrinkle in the use of cell phones in flight. In addition to limiting use to airplane mode on those devices so equipped, the crew currently prohibits the use of or charging of any Samsung Note 7 device at any point while aboard the plane. CNET offers a brief explanation here for why that message has been added to the mix with making sure your tables and seats are in the upright and locked position. (more…)
Bond. Cyber Bond.
Capitalism is a wonderful thing. Free markets have helped humans identify and meet demands by supplying the products and services that envelop an economy. It is also worth noting that necessity is often called the mother of invention, and cybersecurity is not removed from the influence of this type of thinking. (more…)
At the Crossroads
Robert Johnson is believed to have sold his soul to the devil at a crossroads in Clarksdale, Mississippi. Legend has it the devil offered Johnson in trade a well-tuned guitar and a peculiar gift for singing the blues. His songs have been made famous by Muddy Waters, Eric Clapton, and The Rolling Stones, among others. Despite this oft-intoned gift, Johnson suffered an early departure from this world, though one shudders at the thought of such talent descending eternally southward into fire and brimstone, a musical fate we’d more readily assign to boy bands and pre-pubescent pop stars. (more…)
Organizational Climate Change
Planning is part of business, and the emerging changes in our physical world certainly play into that. Unexpected rains and flooding seem to strike different regions of the country with increasing frequency, and the usual threats like hurricanes and tornadoes haven’t completely resigned the stage. (more…)
BREXIT and The Unbearable Lightness of Leaving
Your organization is an island of traditional values and modern technology. Your staff speaks a language that is unique to the industry and has a shop culture that has evolved from the first day you opened for business. You’ve conquered the universe, winning large contracts and making connections that have ushered in waves of revenue and progress. You’ve forged alliances with others in our global economy that strengthen both parties. You’ve faced unruly vendors and cut ties when necessary, and you’ve battled the mighty when compelled to do so, especially when industry momentum was threatened. (more…)
I’m with the Government, and I’m Here to Hold a Hearing
We hear a lot about homeland security, both the pursuit and the official government department. The TSA is probably the latter’s most visible, and often most toxic, representative, especially when you see the little old lady victimized by the random full body search. The work they do is important, but a lot of it never sees the light of day. That can be good or bad. On a slow day, though, you can witness the machinations that propel our homeland into great security, because a recent Senate Homeland Security Committee meeting was recorded and is viewable here. Granted, it’s a couple hours of your life you’ll never get back, but whatever inflates your balloon. (more…)
It’s Graduation Season
The waypoints on our life journeys are marked by ceremony. Weddings, funerals, births and Baptisms, and, from time to time, graduations. High school and college seem to be the major events, but the zealous have introduced kindergarten, grade school, middle school, and traffic school to the mix. So congratulations to those who wiped the points off their driving record with 8 hours of vehicular remediation, Your future is, indeed, bright. (more…)
A Thousand-Year Flood
Columbia, SC is a sleepy little town by most accounts, except when the Gamecocks win at home. The state capitol of South Carolina, Columbia has a vibrant business community and service-sector economy. Until about a week ago, it’s distance from the ocean insulated it from the seasonal hurricane fray. But that was last week. (more…)
Planning for Natural Chaos
Nature’s Good Side
How confident are you that that your network would survive a lightning strike or even a one-hour power outage? Let’s say you’re pretty sure you’ve got the right things in place to weather the storm. Have you tested your strategy in the last month? Year? At any point since the Reagan Administration? (more…)
Katrina and the Waves
In 1985, when IT was an emerging career track and Steve Jobs was resigning from Apple, the British sent Katrina and the Waves across the big pond, walking on sunshine. Fast forward 20 years and we encountered a completely different Katrina and much bigger waves, leaving folks stranded on rooftops and walking on the Superdome. Who knew popular music could be so prescient? (more…)
Planning for DEFCON Twelve
In response to the ever-increasing number of high-profile cybersecurity breaches, The White House has formed the Cyber Threat Intelligence Integration Center to coordinate cyber threat data and assessments. Regardless of your position on government intervention, the move reflects a heightened national awareness of the pervasive nature of cyberthreats in our world. (more…)
The Certainty of Uncertainty
Boys (and Girls) of Summer
Summer’s almost over. The kids are making their way back to school, and the parents are breathing a sigh of relief. Time has flown over the last three months, leaving in its wake a sandy, chlorine-smelling, airplane-riding, summer-camping, barefooted, late-sleeping bundle of teenage angst. Good times, am I right? But while time has flown by, you may have noticed that none of the lawn furniture or street signs or mobile homes have. Flown by, that is. Because we have had a relatively mild hurricane season so far. Well, last winter was mild too, until January checked in. (more…)
Plan for the Worst, Hope for the Best
Joey, Have You Ever Been in a Turkish Prison?
The 1980s comedy franchise Airplane does a great job of spoofing the more dramatic Airport and, to a lesser extent, The Poseidon Adventure. At a time when truly global travel was emerging for the general public, there remained in the hearts of many a fear of the complexity of travel, a fear that has almost completely evaporated in the travel world we take for granted these days. Airplane turned chaos into comedy, exploiting the potential for danger and the human love of a train wreck. (more…)
Like It Never Even Existed
Joplin, Missouri is like a barbell. Downtown retains an interesting mix of history and mid-rise offices while, several miles to the south, the medical complex and commercial corridor almost glistens with new construction. In the middle, a once-vibrant residential area known as South Joplin, is a mix of random new commercial buildings and tract homes, with its former glory wiped away, along with any hint of vegetation, by a Category Five tornado in 2011. All the infrastructure is new, but any visitor would know immediately that the previous iteration of this neighborhood had been stricken from the record. (more…)
A Rising Tide
In the world of college football, we have learned never to underestimate the power of a rolling tide. On the political playing field, though, we’re not sure what to make of a rising tide. It has been described as both global warming and climate change, but the inconvenient truth remains that our world is experiencing some rather dramatic short- and long-term changes. Your organization needs to prepare for both. (more…)
Lynyrd Skynyrd and Malaysian Air
The human tragedy of a plane crash acknowledged but set aside for the moment, consider the contrasting types of loss generated by similar events. For a business or an organization assessing its risk threshold, the real issue is operational recovery and stability.
Statistical Inevitability and Unanswered Questions
Breach is a Heartbeat Away
OpenSSL, the vehicle through which the Secure Sockets Layer protocol protects most websites that encrypt data, has reminded us again of both the vulnerability and security of open source development. The Heartbleed bug, an accidental code addition about two years ago, exploits the heartbeat option within OpenSSL, a mechanism that allows fluid connectivity between user and server via small, hidden signals or pings. Hackers breach the system by sending false signals that fool a website’s server into releasing sensitive information. Hence the vulnerability.
Heartbleed, though, also demonstrates the security of open source development. While its revelation created initial fear and chaos, the Heartbleed bug was fixed within about four days, largely because lots of eyes were on the prize, each pair of which had a vested interest in the elimination of the Heartbleed threat. Imagine if the SSL vehicle had been proprietary, owned by a quiet company with no taste for conflict or liability. Now that’s a hot mess. (more…)
Qualifying a Business Contiunity Planning Firm
When searching for the right Business Continuity Planning (BCP) firm, there are several important factors that should be taken into consideration–not the least of which are location, experience, and support structure. It is important to know that the expectations of your organization will be met, if not exceeded, and that the firm will educate you in the Business Continuity planning process. (more…)