It’s the Data, Stupid

I was looking at Facebook the other day (yes, I know – a security guy that uses Facebook – just wait until you have grandkids and a scary message appeared at the top of the page. It was the 39 year anniversary of my employment at Columbia University. I have been working in IT for 39…

Details

“The Internet of Cows”

Glenn Fink, a security researcher at Pacific Northwest Labs, did a presentation called the “Internet of Cows” at a recent IEEE conference where he showed how dairy farming has become an automated, internet accessible business process. He took the discussion one step further by saying that cows make great human surrogates in the privacy debates surrounding IoT. He…

Details

Behavioral Authentication: Your New Best Friend

Who knows you better than your smart phone? Your family? Maybe. Your colleagues? Perhaps. Your dog? Almost certainly—but that could change very soon. For many of us, our phones and other devices—smart watches, tablets, laptops—are privy to our deepest secrets. Our devices may know, via the alarm we set, when we get up in the…

Details

Impacts of Tennessee’s Revision to Data Breach Notification

David M. Brown reported on April 1, 2016 in Data Breach Notification Laws that the State of Tennessee has passed and received the Governor’s signature on revisions to its breach notification requirements. This law goes into effect on July 1, 2016 and could have significant impacts to Tennessee businesses and others, especially if other states follow…

Details

The Cybersecurity Convergence

People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data? A look at the history of the digital universe shows us that,…

Details

Security is Not a Thing

This seems to be the time of year that everyone is holding a security conference.  I will be attending eight from January through the end of April (and speaking at four of them.) The interesting thing about most of these meetings is that they are usually sponsored by vendors, who believe that their product or…

Details

CISO Advises Enterprises on How to Combat Latest Printer-based Attacks

There were two security incidents over the past week that drew a lot of attention. The first was the ransomware attack against Medstar, a health system based out of Columbia, MD. The second, which received less publicity, was the Neo-Nazi propaganda sent out by infamous Internet troll Weev to publicly accessible printers across the Internet. Out…

Details

What Would Harold Do?

I tell users all the time “Forget everything you learned in Kindergarten.”  It always gets a laugh, gets their attention and gets my point across. It’s not nice to share (your password).  Secrets are really ok (your IP address).  Not only should you not take candy from strangers, you should not take strange candy from…

Details