What Will A Russia-Ukraine Cyberwar Look Like?
Posted on: 03 Mar 2014
Update March 4: According to a Renysis Blog post from February 26 Ukraine has very resilient Internet connectivity not likely to be disrupted by a single event. According to Reuters Tuesday Valentyn…
Cylance Enters End-Point Protection Space
Posted on: 20 Feb 2014
Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching…
A Brief History of Cyber Attacks and the Olympics
Posted on: 03 Feb 2014
The first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting…
Ordinary Folk
Posted on: 29 Jan 2014
I have a pet peeve. It’s the use of the word “folks,” which has been popularized by the current administration. I know it makes the President appear avuncular and, well, folksy.…
New Reports that NSA Searches Angry Birds and Other Apps for Personal Data
Posted on: 27 Jan 2014
Late Monday three separate media outlets reported on how the NSA snoops on data transmitted from cell phone apps. The New York Times, The Guardian, and ProPublica each covered how…
Schneier Predicts Ramping Up of Cyber Crime
Posted on: 27 Jan 2014
In an interview with the BBC well know security expert Bruce Schneier declaimed that intelligence agency attacks on Internet infrastructure have broken trust. “The fact that it has been subverted in ways…
The [Character] Assassination of Edward Snowden
Posted on: 25 Jan 2014
While crass and underhanded, it is not out of the norm for those losing a debate to resort to character assassination. The side that is on the defensive argues by…
Snowden Calls For Termination of Unwarranted Surveillance
Posted on: 23 Jan 2014
In a live chat hosted by The Courage Foundation Edward Snowden called on the US to stop the mass collection of telephone records by the NSA, authorized under section 215 of…
You Mad Bro? You Will Be, After Watching These Jacob Applebaum Videos
Posted on: 23 Jan 2014
The reactions to the depth and scope of the NSA’s surveillance apparatus has varied from ho-hum, “that’s their job,” to OMG “it’s the end of the world as we know…
Tech Bubble? Yes. Security Bubble? No.
Posted on: 21 Jan 2014
Bob Ackerman, a VC at Allegis Capital wrote what could be considered a self-serving piece on the security tech bubble published on VentureBeat. Of course an investor in security companies is…