Not Enough Caffeine
You finally snag the quiet corner at the coffee shop, you local retreat when you really need to get work done. Something about the ambient noise and the fact that nobody around you works with, near, or for you. Just a collection of pilgrims on the road to revenue, beneficiaries of the gig economy hopped up on espresso and pumpkin spice. Take the guy next to you, the one sporting skinny jeans over Chucky T’s and a faux flannel shirt beneath an emerging beardlet. He’s got the right glasses, an open Moleskine notebook in front of him, and just the right number of stickers on the opened lid of his MacBook Pro. Probably working on a social capital start-up, right? (more…)
Nobel Prizes And Cybersecurity
What can well-intentioned Swedes tell us about improving global cybersecurity? Quite a bit, probably, but specifically we should consider the recent award of the Nobel Prize in Economics to Richard Thaler, a professor at The University of Chicago. Thaler’s work in human behavior led to a bestseller titled “Nudge,” a book about helping people make better decisions. Among his findings was the reality that people didn’t voluntarily enroll in 401Ks until their employers made those decisions for them, essentially nudging the employees to be more proactive about the financial health. Once the companies made enrollment essentially mandatory, employees understood the benefit. (more…)
Dirty Deeds Done Dirt Cheap
There are two types of electrical power. The first is AC, or alternating current. It’s what comes out of the plug in the wall. The second is DC, which is stored and distributed by batteries. The combination of the two would be, well, shocking, and it might even generate classic hits like “Back in Black” and “Hell’s Bells.” But those are not the relevant stories about ACDC these days. (more…)
It’s called the connector. The section of highway where I-75 and I-85 join together to pass through the booming metropolis of Atlanta. It is almost always congested, and it carries a lot of information, not unlike the building that used to rise above the north end of the massive swath of concrete. That’s where the Equifax building used to be, and might still be. (more…)
The Safari of Cybersecurity
Sitting on a shady porch overlooking the river and savanna of Samburo in Northern Kenya. To the left, several elephants lounge in the water. To the right, baboons gather along the riverbank and the safety of the trees beyond. In the middle, just across the river from the shady porch, a leopard stretches lazily to shake off a midday nap and surveys the evening’s offerings at what might be considered his food court. Dissatisfied with the current menu, the leopard retires to the shade of the saltbush and acacia tree to give the chefs at the circle of life cafe a chance to prepare a fresh offering.
Cousin Eddie And Hurricane Names
The Semantics Of Passwords
Beyond The Political
Politics is one of those topics best avoided among polite company, and this post in no way espouses particular views or partisan sentiments. It is difficult to talk about federal efforts to enhance cybersecurity without drawing attention to national politics, but that is what we hope to do. (more…)
Harvey The Unimaginable
Back in the day, there was an offbeat Broadway show about an imaginary rabbit that occupied the house and lives of good people. It just sort of seeped in, like a rising tide, from the basement. That rabbit’s name was Harvey, and he was seen only by those who really wanted or needed to see him. (more…)
Riding Along On Easy Street
The Swede Smell Of Cyber
Cat Stevens: Cybersecurity Hero
The Future of Cyber- Part Two
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has some interesting perspectives on the nature of cyber threats going forward. The concept of deterrence, for example is complicated, at least on a national or global scale. “Deterrence requires attribution supported by evidence, further supported by classified information and practices,” Zheng suggests, and governments know that for every action there is a reaction, often deploying the same technology. So global resolution of cyber threat potential seems problematic.
The Future of Cyber- Part One
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has also worked as a senate staffer on the Homeland Security Committee, in the Computer Associates software engineering process, and, most recently, on cyber moonshots at DARPA. So her perspective on cyber reflects and informs those of consumers, governments, and leading edge developers. (more…)
Marsha Marsha Marsha!
The Smaller They Are, The Harder They Fall
No Such Thing As A Free Lunch
It’s A Family Affair
Hacking Up Your Tex-Mex
Camp Songs For IT Professionals
It’s summertime, and the livin’ is easy. Fish are jumpin’, and the cotton is high. If you’re lucky, the old memories from summer camp return to the fore, as nostalgia delivers you from the daily stress of network security and constant threats.
The Business Side Of Cyberthreats
When Cybersecurity Is Mainstream
Hacking Ain’t What it Used to Be
Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t kept up with the rapid pace of technological innovation. After all, ARPANET was in its infancy in 1983, and the World Wide Web wouldn’t become a consumer reality until around 1990. Protecting isolated computers is a wildly different thing from keeping networked devices secure in the IOT world. (more…)
The Imperfect Storm
There’s a storm brewing, potential chaos lurking in the wings. And I’m not talking about politics. Though, if we’re being honest, there’s a storm brewing there, too. We can argue cause and effect, but the world is changing in palpable ways, probably more rapidly than we imagine. (more…)
When The Chips Are Down
Arraigned On The Planes Of Spain
Back when Julie Andrews was in her theatrical prime, there was more than just The Sound of Music in the hills. In My Fair Lady, she repeated “the rains in Spain stay mainly on the plains” in an effort to lose her cockney accent. One could argue that Eliza Doolittle was trying to escape her past and enjoy the liberty associated with a new identity, a new language, a new sense of freedom. The same might be said of Peter Yuryevich Levashov, a Russian hacker whose fingerprints are said to be found on such exploits as the Russian intrusion into our 2016 elections. (more…)
Not What You Think It Is
Some things are exactly what you expect. A ballpene hammer, for example, is difficult to mistake for anything else. But if someone hammers your online presence, littering comment and review boxes with inaccurate characterizations of your business, the picture seen by your customers and prospects is very different from what you might imagine. (more…)
Introverted Social Media
Even if we could isolate the recent activity of Russian hackers, imagine a mainstream marketplace for nefarious services provided by invisible people paid in Bitcoin.The information you seek is mined from the personal profiles and accounts of your target audience, whether that audience is a cheating spouse or a rebellious teenager with a hidden social media presence. It’s a complete violation of privacy, and we feed our own vulnerability with every trace of our digital footprint. (more…)
Is That Toaster Listening To Us?
In the interest of your organization’s OPSEC, step away from the microwave before you answer this question. There is no telling who might be listening right now. And if you’ve ever had Russian dressing on your salad, be sure you state that explicitly. Denial is not just a river in Egypt. Here’s the question: How confident are you that your cybersecurity practices are up to speed? (more…)
Who’s Baking Your Cookies?
So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the Internet. (more…)
Who’s Watching The Watchers?
It’s been a strange month or two in the world, and that’s not simply a political statement. There is a very real sense that somebody’s watching, all of us, all the time, and that we should take that for granted. Increasingly, it seems, that voyeurism extends beyond our digital footprint and into our everyday physical spaces. While novelists and science fiction authors have been seizing on the approach of these days for decades, the Luddites are always the last to know. But, you might ask, who is watching the watchers? Apparently, that would be Wikileaks. (more…)
Now You See It, Now You Don’t
Stand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by phishing your account information to unlock, wipe, and resell the phone. By standing against the wall, you limit the access and cover your blind side. Sadly, the stories are anything but rare. (more…)
Bundle Up To Avoid The Cold
With every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating our elections. Though we could debate the extent of the success, nobody seems to doubt the intent any longer. If those chilly diplomatic breezes seem to intimate a second cold war, will cyber be the weapon of choice? Is it already?
All Motivated with No Place to Go
An election cycle is great for reminding citizens what they’re looking for in a leader, a party, and a government. Granted, we don’t need endless election cycles, but a democratic republic depends on an educated and motivated citizenry. So we’ve got that going for us.
As IT professionals, you might have a vested interest in the actions and attentions of government. At some level, investments in infrastructure and mechanisms can only be made by governments, and the responsibility for maintaining that infrastructure falls to them as well. Think of roads and bridges. And the Internet has evolved into a really complex infrastructure, a road that bridges cultures around the globe. Without legislating the access and traffic, at some level governments need to do what they can to facilitate safe and steady flow of information and opportunity. (more…)
It’s Not Just for Sarah Palin
Back in the day, when heartless senior management pointed out the flaws of the working man, the most retribution he would reasonably fear is that his car would get keyed in the parking lot. Sure, it’s a 1972 Corvette Stingray, but it’s still just a car. And that’s about as far as it would go. Nowadays, disgruntled employees swing a much bigger hammer, and the key they carry now slides down your network and leaves a scratchy mess the size of Texas. Literally. (more…)
New Technologies, New Faces, and Mixed Metaphors
The economy has been expanding. Maybe not as fast as you’d hoped, but expanding nonetheless. You may have noticed an increase in RFPs, or maybe you’ve seen more activity at trade shows that suggest the project gatekeepers are loosening their grip on the padlock. Get you some of that! (more…)
Half a Million Reasons
You run a tight ship. You’re like the Admiral Nimitz of the IT space. You work closely with management to maximize resources. You know the projects already on the books for 2016, and you’re fighting for every penny, trying to keep the c-suite focused on the future, aware of the dangers that lurk in the ether and the need to guard against them. They just won’t listen to reason! (more…)
Building a Better Team
As an IT professional and keen business observer, you’re always scouting talent. You like to recruit good people as you find them, not as you need them. Your savvy and swagger often assure the corner offices that you’ve got everything under control, even as they tell you about the seven new projects they’ve landed for next year. You’d like to celebrate, but you’ve got networks to manage, managers to network, and emails to return.
And you’re going to need more people. (more…)
A Cyber War on Women
U.S. House of Representatives Inspector General Theresa Grafenstine told Congress last week what every male IT professional has been saying for years: There are not enough women in this business. The larger context of her comments was the ongoing global cyberwar we seem to be fighting and the notion that arming ourselves with mostly men in this battle is, quite literally, a half-brained idea. Women, she suggests, bring unique skills and strengths to bear on these and other situations, and we should work toward a greater balance between men, women, and minorities. (more…)
A River Runs Through IT
The Plymouth Rock of Cybersecurity
Your organization has weathered some storms, am I right? The valleys between the peaks, when sales slow and payroll weighs heavy on the mind. You’ve hired through the good times and had to cut back in the lean times, but you and Michael have rowed your boat ashore, leaving the roiling seas of fiscal uncertainty behind you. Welcome to Plymouth Rock, Pilgrim. How about some steady quarterly earnings and revenue growth to go with that maize? (more…)
Restricting the Social Media Diet
If we use social media in the hiring process, does employee presence in that space increase organization vulnerability?
Increasingly, recruiters and employers are using social media to screen candidates. On the bright side, candidates can and are rewarded for the creativity and writing skills they display. The dark side is the overwhelming tendency to dismiss candidates whose expressed views or social habits differ from the employer’s. Like it or not, this seems to be the new normal.