“The Internet of Cows”

Glenn Fink, a security researcher at Pacific Northwest Labs, did a presentation called the “Internet of Cows” at a recent IEEE conference where he showed how dairy farming has become an automated, internet accessible business process. He took the discussion one step further by saying that cows make great human surrogates in the privacy debates surrounding IoT. He…

Details

Behavioral Authentication: Your New Best Friend

Who knows you better than your smart phone? Your family? Maybe. Your colleagues? Perhaps. Your dog? Almost certainly—but that could change very soon. For many of us, our phones and other devices—smart watches, tablets, laptops—are privy to our deepest secrets. Our devices may know, via the alarm we set, when we get up in the…

Details

Impacts of Tennessee’s Revision to Data Breach Notification

David M. Brown reported on April 1, 2016 in Data Breach Notification Laws that the State of Tennessee has passed and received the Governor’s signature on revisions to its breach notification requirements. This law goes into effect on July 1, 2016 and could have significant impacts to Tennessee businesses and others, especially if other states follow…

Details

The Cybersecurity Convergence

People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data? A look at the history of the digital universe shows us that,…

Details

Security is Not a Thing

This seems to be the time of year that everyone is holding a security conference.  I will be attending eight from January through the end of April (and speaking at four of them.) The interesting thing about most of these meetings is that they are usually sponsored by vendors, who believe that their product or…

Details

CISO Advises Enterprises on How to Combat Latest Printer-based Attacks

There were two security incidents over the past week that drew a lot of attention. The first was the ransomware attack against Medstar, a health system based out of Columbia, MD. The second, which received less publicity, was the Neo-Nazi propaganda sent out by infamous Internet troll Weev to publicly accessible printers across the Internet. Out…

Details

What Would Harold Do?

I tell users all the time “Forget everything you learned in Kindergarten.”  It always gets a laugh, gets their attention and gets my point across. It’s not nice to share (your password).  Secrets are really ok (your IP address).  Not only should you not take candy from strangers, you should not take strange candy from…

Details

The Evolution of the CISO

We are seeing that in quite a few organizations the Chief Information Security Officer (CISO) role is going through a period of transition. Leading organizations that didn’t have a CISO role are now actively scoping the responsibilities of this role. To date, the security budget often remains a fraction of total IT spend, and a…

Details

Making Insurance Part of Your Enterprise Risk Management Program – Part Two

In this series, Grace Crickette provides C-Level executives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability policy. Part Two: A Very Brief History of Insurance and Coffee Houses Coffee houses or cafés have served as centers of social interaction for patrons…

Details