24 Sep 2018

Software Has Become A National Security Vulnerability

Software and our internetworked computer systems are more complex than ever. Which means to develop countermeasures to these new types of cyberattacks we have to work harder than ever.

Read More
04 Jul 2018

Embracing a Future of Technical and Political Churn

Two things happened last week that will ultimately have a huge impact on almost every American consumer alive today.

Read More
07 Jun 2018

10 Rules For Cybersecurity Salespeople

The cybersecurity market is so congested, it can be difficult to establish a dialogue with overwhelmed CISOs.

Read More
07 Jun 2018

Information – The Final Frontier of Cybersecurity

Cyber trust is not just about securing information technology systems. You must also secure business processes.

Read More
18 May 2018

Is Quantum Computing Ushering in an Era of No More Secrets?

In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has created such a powerful secret breaking device that

Read More
11 May 2018

Three Critical Factors Increasing Cyber Risk for 2019

What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.

Read More
20 Jan 2018

What did Cybersecurity and Cyberwar look like in 1999?

Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other

Read More
24 Jun 2015

Cybersecurity Issues for the Bulk Power System

In the United States, it is generally taken for granted that the electricity needed to power the U.S. economy is available on demand and will always be available to power our machines and devices. However, in recent years, new threats have materialized as new vulnerabilities have come to light, and

Read More
06 Aug 2012

Questioning the Offense-Defense Balance in Cyberspace

Analysts, policymakers, and defenders often paint a bleak picture of the cybersecurity landscape. The Internet was built for resiliency, convenience, and openness, not security, and barriers to entry are low, meaning that criminals, foreign intelligence, activists, and states have many opportunities to launch countless attacks, especially if they are automated.

Read More
17 Jun 2011

China military paper urges steps against U.S. cyber war threat

“China must boost its cyber-warfare strength to counter a Pentagon push, the country’s top military newspaper said on Thursday after weeks of friction over accusations that Beijing may have launched a string of Internet hacking attacks. The accusations against China have centered on an intrusion into the security networks of

Read More