Security

Most hacks require some kind of user feedback.  Whether it’s visiting a certain website, opening a certain .exe file, or clicking “yes” on an OK button, exploits are usually something we have to allow. Apple identified a new bug last week, however, which uses a far more...

Resilience is a fashionable term in homeland security circles these days.  The idea is simple.  It’s impossible to predict or plan for every kind of emergency situation.  What you can do, however, is to plan for the time after an emergency comes. If there are structures and procedures in place to...

Talk about a shot heard ‘round the world.  The so-called “Panama Papers” – a trove of data on money laundering and other financial shenanigans by the world’s wealthiest people – has already claimed several careers.  The Prime Minister of Iceland had to resign.  Russian oligarchs are scrambling for...

Whenever a cybersecurity incident happens, people start pointing fingers. The I.T. staff is usually where most blame is assigned, at least to start.  If only the right patch was in place, if only the anti-virus software had been updated, if only the network was monitored correctly –...

Innovation isn’t confined to the world of legitimate commerce and business.  Criminals innovate too.  That’s become all too apparent in the last month with the advent of new kinds of so-called “ransomware” attacks around the world. The idea of ransomware has been around for a decade or more.  Yet...