Not Enough Caffeine

You finally snag the quiet corner at the coffee shop, you local retreat when you really need to get work done. Something about the ambient noise and the fact that nobody around you works with, near, or for you. Just a collection of pilgrims on the road to revenue, beneficiaries of the gig economy hopped up on espresso and pumpkin spice. Take the guy next to you, the one sporting skinny jeans over Chucky T’s and a faux flannel shirt beneath an emerging beardlet. He’s got the right glasses, an open Moleskine notebook in front of him, and just the right number of stickers on the opened lid of his MacBook Pro. Probably working on a social capital start-up, right? (more…)

Nobel Prizes And Cybersecurity

What can well-intentioned Swedes tell us about improving global cybersecurity? Quite a bit, probably, but specifically we should consider the recent award of the Nobel Prize in Economics to Richard Thaler, a professor at The University of Chicago. Thaler’s work in human behavior led to a bestseller titled “Nudge,” a book about helping people make better decisions. Among his findings was the reality that people didn’t voluntarily enroll in 401Ks until their employers made those decisions for them, essentially nudging the employees to be more proactive about the financial health. Once the companies made enrollment essentially mandatory, employees understood the benefit. (more…)

Dirty Deeds Done Dirt Cheap

There are two types of electrical power. The first is AC, or alternating current. It’s what comes out of the plug in the wall. The second is DC, which is stored and distributed by batteries. The combination of the two would be, well, shocking, and it might even generate classic hits like “Back in Black” and “Hell’s Bells.” But those are not the relevant stories about ACDC these days. (more…)

The Connector

It’s called the connector. The section of highway where I-75 and I-85 join together to pass through the booming metropolis of Atlanta. It is almost always congested, and it carries a lot of information, not unlike the building that used to rise above the north end of the massive swath of concrete. That’s where the Equifax building used to be, and might still be. (more…)

The Safari of Cybersecurity


Sitting on a shady porch overlooking the river and savanna of Samburo in Northern Kenya. To the left, several elephants lounge in the water. To the right, baboons gather along the riverbank and the safety of the trees beyond. In the middle, just across the river from the shady porch, a leopard stretches lazily to shake off a midday nap and surveys the evening’s offerings at what might be considered his food court. Dissatisfied with the current menu, the leopard retires to the shade of the saltbush and acacia tree to give the chefs at the circle of life cafe a chance to prepare a fresh offering.
(more…)

Cousin Eddie And Hurricane Names

Clark Griswald’s cousin meant well, but every time he pulled the RV into the driveway, chaos ensued. All Clark seemed to get out of the visits was a pair of white patent leather loafers. Ain’t family grand, especially when you’re on vacation.

(more…)

Justice

Politico and others report that the Department of Justice has indicted a Chinese national accused of selling malware to hack a number of American and European companies. The general sense is that Yu Pingan and friends conspired to create the Sakula malware used effectively in the OPM breach and others. (more…)

The Semantics Of Passwords

One of the hallmarks of successful cybersecurity is an organization’s ability to protect its assets while making them fully available to staff. The right people accessing the right data and moving the human ball forward. That’s the stuff dreams are made of. A key ingredient to that stuff is a mechanism that encourages and requires robust passwords at the consumer level. Not the general consumer, of course, but the staff who consumes your data in order to help your business thrive.

(more…)

Harvey The Unimaginable

Back in the day, there was an offbeat Broadway show about an imaginary rabbit that occupied the house and lives of good people. It just sort of seeped in, like a rising tide, from the basement. That rabbit’s name was Harvey, and he was seen only by those who really wanted or needed to see him. (more…)

Riding Along On Easy Street

Your organization is a well-oiled machine. It’s nimble, responsive, and ready to follow in any direction you lead. Or lean. In many ways, it’s like a Segway. You don’t want to get too far ahead of it, and if you stay behind it, the machine will simply stand still. You have to confidently lean in the direction you want it to go, and you have to trust it to respond accordingly. When you reach that level of synergy, you and your Segway — your organization — become one.

(more…)

The Swede Smell Of Cyber

Checking into the hotel in Stockholm, visiting Scandinavia with the family, I couldn’t help notice the local papers. On the cover, above the fold, was the face of a man frustrated with a recent turn of events. Even though I couldn’t read the words — I don’t know Swedish — I could tell the man was a politician. It was that kind of picture. Given the current state of American politics, it was almost refreshing to see another country swimming in scandal. Imagine my surprise, though, when I discovered the punchline. There were no prostitutes or drunken junkets. There was only cyber. But it was just as messy.

(more…)

Cat Stevens: Cybersecurity Hero

Though he now performs under a different name, Cat Stevens once had his finger on the hippy, singer-songwriter pulse in America. Naturally, this made him something of a cyber savant as well. Naturally. It was his early encouragement of software and firmware updates and the direct correlation between those and network security. And he worked all of this early magic into his lyrics. Specifically one line, which suggested that, “The patches make the goodbyes harder still.” Many assumed he was only referring to the blue jeans of our passing youth, faded blue into the sky. But give that joint a rest and read between the lines.

(more…)

You Have The Power, Mostly

Just when you thought it was safe to go back in the water, Russian hacking resurfaces in waters beyond the political. Sure, it was devastating when we realized that Russia had wormed its way into our electoral and democratic process, but that was apparently just the beginning of the story. (more…)

The Future of Cyber- Part Two

During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has some interesting perspectives on the nature of cyber threats going forward. The concept of deterrence, for example is complicated, at least on a national or global scale. “Deterrence requires attribution supported by evidence, further supported by classified information and practices,” Zheng suggests, and governments know that for every action there is a reaction, often deploying the same technology. So global resolution of cyber threat potential seems problematic.

(more…)

The Future of Cyber- Part One

During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has also worked as a senate staffer on the Homeland Security Committee, in the Computer Associates software engineering process, and, most recently, on cyber moonshots at DARPA. So her perspective on cyber reflects and informs those of consumers, governments, and leading edge developers. (more…)

Marsha Marsha Marsha!

You would think it would’ve been Jan Brady who wreaked havoc on the world this summer, trying anything to get the attention that always goes to Marsha. But, alas, it was Cindy, a tropical storm that stormed off the gulf coast like a teenager scorned, leaving a trail of devastation that even Gladys couldn’t fix. Homes were destroyed, businesses damaged, and lives lost, reminding us of the serious punch that Mother Nature can pack when she wants to. If you’re reading this, you’re among the lucky.

(more…)

The Smaller They Are, The Harder They Fall

While the media streams constantly with news of big-name breaches that threaten the global economy to the core, an even more significant story grows on the outer banks of public awareness. Sure, the big banks and retailers have lots of data to steal, but they also have the resources to protect their networks. The same is not always true of smaller enterprises. Perhaps in recognition of this, ransomware attacks on small businesses are increasing in greater numbers than their Goliath counterparts, according to Small Business Trends.

(more…)

No Such Thing As A Free Lunch

As remarkable as adware can be, both from the marketing side and the consumer side, the fact that banner ads and other promotions stem directly from your search habits is really the least of your worries. Imagine if the ads began to deploy code that controlled your computer, changed your default browser, and tracked your search habits for a Chinese marketing firm? (more…)

It’s A Family Affair

If you grew up in a large family, you know the sensation. Lots of aunts and uncles and thousands of cousins you saw on a limited basis, like every other year or so at a family reunion somewhere. Some of those kids were really weird, and they seem to come by it pretty naturally, since Uncle Fred and Aunt Eunice popped out of the RV with a gin and tonic in one hand and a fistful of political conspiracy theories in the other. Who knew Tolstoy was the second gun on the grassy knoll?

(more…)

The Business Side Of Cyberthreats

The Wall Street Journal is not a publication prone to hyperbole, so a recent headline in the May 18th Business & Finance section screamed for attention. “Cyberthreats Breed Deep Unease” was the title of the article. The media would have us believe that all the really bad things seem to happen to multinationals or political parties. Nothing could be farther from the truth.

(more…)

When Cybersecurity Is Mainstream

Let’s face it. Most IT Departments feel undervalued or ignored. Like lawyers, you try to avoid them at cocktail parties until you need one. At least that’s the way it was in the old days, like back in 2015 or so. With the ever-advancing wave of cyberthreats and our reluctance to reduce the epic size of our digital footprints, cybersecurity is entering the mainstream in new and surprising ways. Consider a long but thorough examination of the current state of cybersecurity in, of all places, The New Yorker. Known more for it’s insights into western philosophy and the Upper Easy Side, even The New Yorker has recognized the growing ubiquitousness of cyberthreats. Have you?

(more…)

Hacking Ain’t What it Used to Be

Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t kept up with the rapid pace of technological innovation. After all, ARPANET was in its infancy in 1983, and the World Wide Web wouldn’t become a consumer reality until around 1990. Protecting isolated computers is a wildly different thing from keeping networked devices secure in the IOT world. (more…)

The Imperfect Storm

There’s a storm brewing, potential chaos lurking in the wings. And I’m not talking about politics. Though, if we’re being honest, there’s a storm brewing there, too. We can argue cause and effect, but the world is changing in palpable ways, probably more rapidly than we imagine. (more…)

When The Chips Are Down

Ever had that feeling that someone is watching you, like the door is ajar and folks just passing by the office can see everything on your desk? Have you felt that way for the last seven years? If so, you’re not alone, especially if your computers use Intel chips with vPro technology. According to a recent Ars Technica report, Intel has only recently provided a patch to a backdoor in your network that has been open since the year Facebook was launched. Think about that.

(more…)

Arraigned On The Planes Of Spain

Back when Julie Andrews was in her theatrical prime, there was more than just The Sound of Music in the hills. In My Fair Lady, she repeated “the rains in Spain stay mainly on the plains” in an effort to lose her cockney accent. One could argue that Eliza Doolittle was trying to escape her past and enjoy the liberty associated with a new identity, a new language, a new sense of freedom. The same might be said of Peter Yuryevich Levashov, a Russian hacker whose fingerprints are said to be found on such exploits as the Russian intrusion into our 2016 elections. (more…)

Who’s Baking Your Cookies?

So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the Internet. (more…)

Who’s Watching The Watchers?

It’s been a strange month or two in the world, and that’s not simply a political statement. There is a very real sense that somebody’s watching, all of us, all the time, and that we should take that for granted. Increasingly, it seems, that voyeurism extends beyond our digital footprint and into our everyday physical spaces. While novelists and science fiction authors have been seizing on the approach of these days for decades, the Luddites are always the last to know. But, you might ask, who is watching the watchers? Apparently, that would be Wikileaks. (more…)

Now You See It, Now You Don’t

Hacker trying to hack into phoneStand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by phishing your account information to unlock, wipe, and resell the phone. By standing against the wall, you limit the access and cover your blind side. Sadly, the stories are anything but rare. (more…)

Bundle Up To Avoid The Cold

Forest covered in snowWith every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating our elections. Though we could debate the extent of the success, nobody seems to doubt the intent any longer. If those chilly diplomatic breezes seem to intimate a second cold war, will cyber be the weapon of choice? Is it already?

(more…)

Somewhere Between Sliced Turkey and Santa Claus

 

Working SantaYour organization has weathered some storms, am I right? The valleys between the peaks, when sales slow and payroll weighs heavy on the mind. You’ve hired through the good times and had to cut back in the lean times, but you’ve steadied the ship and there’s quite a bit to be thankful for as you try to recover from Aunt Eunice’s cornbread stuffing. And how about some steady quarterly earnings and revenue growth to go with that maize? That would be the best gift of all to slide down the chimney in a couple of weeks. (more…)

And In Other News

circusWhile the world has been watching the American political circus over the past several years, a recurring question put forth by all parties has been, “Can this or that person be trusted with the nuclear codes?” This is an important question, no doubt, but one that overshadows an even more significant question. Granted, the President is the single gatekeeper to the national arsenal, but enemies foreign and domestic seem to be making their own keys to nuclear infrastructure these days. (more…)

Dyn-A-Mite!

dynamiteA closer look at recent chaotic events surrounding the DDoS attacks on Dyn DNS reveals some frightening things about our rapidly growing dependence on the Internet. A recent NY Times article does a great job of explicating the events in layman’s terms, including the warning, “And the threats will continue long after Election Day for a nation that increasingly keeps its data in the cloud and has oftentimes kept its head in the sand.” (more…)

Blue Skies and Fireflies

Businessman using his tablet phone on airplane. Business travel and communication concept.If you have flown lately, you might have noticed a new wrinkle in the use of cell phones in flight. In addition to limiting use to airplane mode on those devices so equipped, the crew currently prohibits the use of or charging of any Samsung Note 7 device at any point while aboard the plane. CNET offers a brief explanation here for why that message has been added to the mix with making sure your tables and seats are in the upright and locked position. (more…)

Jackware In The Box

carjackFans of this blog — and let’s be honest, who isn’t a fan? — will recall a recent post that detailed the carjacking of a Jeep Cherokee from several miles away. It was an effort to demonstrate the security vulnerability of cars equipped with wireless access points and other IoT equipment. And it worked. Cars were recalled, security issues were addressed, and we now have an additional lens through which to view rapidly advancing car technology. But what if the car is advancing beyond us, the drivers? (more…)

Open Says A Me

2faPasswords are the first line of defense for critical network infrastructure. Building an organizational expectation for strong password use in no longer seen as an option. It is now a requirement. If you can get your staff to deploy 8-12 characters randomly selected from all varieties available, that’s $uPer GrE@+. (more…)

Politics as Unusual

Regardless of your political affiliation or your favorite — or least unfavorite — candidate, the 2016 election cycle has been anything but predictable. If this were a circus, it would be a very good one. Instead, though, it is the pinnacle of the democratic mechanism by which we choose our leadership. That is a sobering reality that could make you reach for the bottle. (more…)

It’s Graduation Season

The waypoints on our life journeys are marked by ceremony. Weddings, funerals, births and Baptisms, and, from time to time, graduations. High school and college seem to be the major events, but the zealous have introduced kindergarten, grade school, middle school, and traffic school to the mix. So congratulations to those who wiped the points off their driving record with 8 hours of vehicular remediation, Your future is, indeed, bright. (more…)

Ransomware Exposed: Sextortion

Ransomware is not new. It’s been around for a while, and clever hackers have found ways to extort just the right amount of money to make it worth your while to settle. The balance is somewhere between what the data is worth and what it would cost you to recover it through normal machinations. Traditionally they’ve kept the number low enough that is was cheaper to pay up and walk away. An easy decision, perhaps, when the data is just that. Data. (more…)

Hackers Prove Patient But Swift

Breaching a global bank network is no smash and grab operation. As organizations focus and fund their cybersecurity resources with even greater alacrity, the bad guys have to continue to polish the edge of their sword, patiently waiting for the right opportunities to score bigger and bigger hits. Such is the case with the recent — and second — attack on Swift, the global messaging network banks use to move money around. If you think you’re covering all your bases and keeping your data out of harm’s way, you may be giving yesterday’s news and last week’s security protocols too much play. Hackers, in one small way, are like PGA Tour Pros: These Guys Are Good. (more…)

A Coppertone Moment

It’s the official beginning of summer, and hundreds of thousands of tourists from the far reaches of North America are making their way across the USA in a Chevrolet, migrating to the seasonal climes and exotic beverage offerings of coastal communities across the Southeast. Escaping the more — perhaps presumably — mundane and pedestrian challenges of their normal lives, many tourists engage in atypical behavior, casting inhibitions to the wind and embracing the larger world in various stages of sobriety and dress. It’s all umbrella drinks and beach reads, kids running amok and minivans loaded with folding chairs and inflatables. Now imagine your data sitting next to that family in Denny’s. You know the one. (more…)

Authentic Intelligence

Over the last holiday season, around the IT water cooler, the talk inevitably turned to the cool new gadgets that impressed the mortals and blew the minds of Luddites everywhere. That talk was all about Artificial Intelligence and the need to more efficiently sell shoes. IT folks are way too immersed in AI to get bogged down in practical application, but Marketing and Sales were all over it, both in search and point of sale.  (more…)

Grab That High Voltage Line, Again

As thrilling as it might have been for the relatively few men and women who successfully navigated the Ashley Madison portal to extramarital affairs, nothing can compare to the thrill of seeing your name and vital statistics on view in the public square, again. But that is the ruling of a District Court Judge in Eastern Missouri, who determined that “embarrassment” was not sufficient cause for the plaintiffs to proceed as “John Does” in their suit against Avid Dating Life, Inc. for not protecting their sensitive data. This New York Times article will get you up to speed, if necessary. (more…)

60 Minutes of Cyberthreat

It was a beautiful Sunday, a great day to be outside enjoying the wonder of nature. Maybe you played golf, or maybe you got two tractors stuck trying to cut firebreaks into quail woods that desperately awaited a prescribed burn, probably wishing you had chosen to play golf instead. Don’t ask.
At any rate, Sunday evening rolls around and you settle in for a little light television to bring the weekend to a close without letting Monday rush the gates ahead of schedule. And then it happens.

(more…)

Bite from the Apple

Which interests outweigh the others? Should the U.S. Government be able to force Apple to assist in breaching the iPhone used by a terrorist? Or should consumers rest assured that, even when their feet are held to the fire, private companies can hold the line about their intellectual property and the security of their products? What was set to be a contentious and landmark legal battle has now been relegated to the moot court and debate team practice file. (more…)

Security Starts In The Home

titanicOr maybe the home office, where the perception might exist that the greatest threat to network and data security is a rogue Russian hacker or a disenfranchised neckbeard living in his mother’s basement. But that perception is just the tip of the iceberg, and too many organizations spend too much time rearranging the deck chairs on the Titanic.

If you want to see the problem more clearly, take a look around the office, from Agnes in Accounting to Stan the Man in Sales. From Reggie in Receiving to Ruth in Reception. The people on your staff are wonderful, devoted, and talented members of your team. They are also the biggest threat to your security. (more…)

And The Award Goes To…

awardsIt’s awards season, our time of looking back to a previous year’s achievements across a variety of cultural disciplines. The Oscars, the Golden Globes, and the Peoples’ Choice Awards are just a few. As an IT professional, you’ve longed for more industry-specific recognition, and awards like “Best Pocket Protector in a Supporting Role” or “Best Line of Code in a Feature Length Composition” make your digital heart sing. (more…)

The Gifts That Keep On Giving

startIsn’t it great to be back at work? The kids are back in school, the elf-on-the-shelf is back in the attic planning next year’s pranks, and all you’ve got left to look forward to are the credit card bills. Santa was a bit overzealous, perhaps, but the looks on their faces make it all worthwhile, am I right? (more…)

The Manhattan Project

nycThe District Attorney for New York County and Manhattan is officially calling for smartphones to be equipped with a backdoor. Boing Boing reported last week that the DA’s efforts to ensure law enforcement access to stored data on all tablets and smartphones has the support of law enforcement officials in The UK and The Netherlands. So there’s that. But while the DA’s office goes to great lengths to affirm that access under search warrant would not violate human or civil rights, the report does not address the very real problem on the tech side. If you put a chink in the armor, it seems, wouldn’t you invite other, less hospitable elements to the party? (more…)

Ho Ho Hold On Just A Minute

santaAs an IT professional, you are familiar with social engineering. You’ve probably even had specific training on social engineering and the ubiquitous threat it poses to your network. As a result, you look suspiciously at Melvin, the new facilities guy, as he makes small talk with Raynell at the front desk. Is that a thumb drive on his big key ring? (more…)

That Time Again Already?

santaIt’s the beginning of the holiday season. The radio stations switched to Christmas carols around Halloween, Santa is ringing a bell over a red bucket on every street corner, and we haven’t even carved the first of the annual pair of turkeys, much less cleared the freezer of last year’s fruitcakes from Aunt Eunice. Our only consolation, apparently, is the conspicuous consumption masking itself as Black Friday.
(more…)

Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor