Paul Robertson

Director, Cyber Security


Wearables in the Workplace, Get the Policy Right Today

Posted on: 17 Jun 2014

Do your workplace policies cover wearable devices? Many commercial and Government facilities ban cameras and cellular phones with cameras, but having such policies and not enforcing them can hurt you in the…

Thermal Imaging Attacks; Research Heats Up!

Posted on: 19 Dec 2013

We’ve all had or seen server room doors protected by combination locks. Most safes these days are protected by electronic keypads, like the ones used to safeguard on-site backup tapes. Using…

Sometimes Your Employees Go Home; The Case for Securing Home Users

Posted on: 21 Nov 2013

Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train…

Software Defined Radio: A Hacker’s Dream

Posted on: 11 Nov 2013

Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard  of researchers (and attackers) looking at ways to exploit …

Can’t Touch This? Researchers Successfully Eavesdrop on Contactless Cards

Posted on: 06 Nov 2013

Contactless card transactions are becoming increasingly popular in the United States, Europe and Asia. In the United Kingdom alone there are some 34.5 million cards in issue with contactless functionality…

Firmware Attacks on the Uptick

Posted on: 04 Nov 2013

Firmware attacks are growing increasingly popular among software hackers. Despite efforts to issue patches for firmware, reported attacks are on the uptick. For instance, Ruben Santamarta, a security researcher at IOActive, recently…

MIT Researchers Uncover Security Flaws in C and C++ Software

Posted on: 01 Nov 2013

MIT researchers have produced a new paper that uncovers security flaws in C and C++ software, generated by compiler optimizations that discard ambiguous code or code, which produce undefined behavior. Some of…

Wormiversary!

Posted on: 01 Nov 2013

November 2, 2013 is the 25th anniversary of the Morris Worm. In the intervening years, we have not solved the problems of buffer overflows, reusable single-factor credentials, peer-to-peer trust or password…