The decades-long effort to develop solutions to cyber insecurity has been led by the usual suspects drawn from the policy and legal community. That’s not […]
Category: Information Security
The Importance of Context
Last night during the Super Bowl, cryptocurrency company Coinbase ran an ad that featured a QR code bouncing around the screen. That’s it. No actors, […]
Speed and Scale
There is no shortage of good ideas in cybersecurity, but what divides the best concepts from the best solutions is how quickly and widely they can be employed. Meaningful success demands you work at combat speed and on a global scale.
End Cybersecurity Awareness Month
Management guru Peter Drucker said, “what gets measured gets managed.” Which helps to explain why October – Cybersecurity Awareness Month – is such a bad […]
Ransomware: The Present We Deserve?
The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem like all […]
From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice
If everyone agrees on what we should do, why do we seem incapable of doing it? Alternately, if we are doing what we have been told to do, and have not reduced the risks we face, are we asking people to do the wrong things?
The Wolf Approaches
If cybersecurity had a doomsday clock, it just got closer to midnight. Thankfully, we’ve got a snooze button.
We Learn From Death
Cybersecurity will get better when people die in sufficiently large numbers.
Intelligence Agencies Are Not Here to Defend Your Enterprise
The way to reduce the chance that someone can crack your computer code is to write better code, and test it faster than the spooks can.
Being All You Can’t Be
Who builds weapons? Who connects the far-flung military commands? Where does all the nation’s technical expertise reside?