-
AI Security
Testing AI in Defense – A New Kind of Security Challenge
Looking back at our engagement, I'm concerned that the pace of AI adoption in military will overtake our abilities to validate and verify such systems. If AI systems continue proving valuable, there is nothing that will stop their adoption, but…
Read More » -
Leadership
Interim Management as a Career Option
The face of interim management is changing. Traditionally, an interim manager was someone at the end of his career who chose interim management to extend his working years. This is changing fast. An increasing number of managers – both men…
Read More » -
Cyber-Kinetic Security
Polymorphic Viruses: The Shape-Shifting Malware Menace
Polymorphic viruses represent a turning point in malware history. These shape-shifting programs have shown that malicious code can be made highly adaptable, challenging the very foundations of signature-based security. We’ve examined how polymorphic malware works - using encryption, mutation engines,…
Read More » -
Leadership
What is Interim Management?
When crisis strikes your business, what can you do? As you try to pick up the pieces, at some point your mind would likely turn to the fantasy of bringing in an accomplished executive with extensive experience in the exact…
Read More » -
Cyber-Kinetic Security
Social Engineering – Greatest Information Security Risk
Social engineering doesn’t have to be just a supporting process to obtain system access; it is could be even more dangerous when it is used as the main attack. We, information security defenders, rarely consider that risk. If you think…
Read More » -
Cyber-Kinetic Security
“Zero Tolerance” to “80-20” – Lazy Approaches to Cyber Risk
There is a new danger lurking in the information assets of countless organizations around the globe disguised by a plan devised to protect a large portion of those assets while failing miserably to protect the rest. Zero tolerance approach to…
Read More » -
Cyber-Kinetic Security
Information Security is not IT Security
Information security and IT security are often used interchangeably – even among experienced security professionals. While the two terms are related and share the common goal of protecting the confidentiality, integrity, and availability (CIA) of information, there are significant differences…
Read More » -
Quantum Computing
Quantum Snake Oil
Don’t get me wrong - as a techno-geek at heart, I love the science of quantum computing. One day, it will upend cryptography as we know it. We’ll have to transition to new algorithms. That day will come - but…
Read More » -
Cyber-Kinetic Security
The Lights Are Blinking Red, and Cyber Budgets Are Blinking Off
We finally got the enterprise to look at cybersecurity. The crash slammed the door on spend just as threats professionalized and the attack surface exploded. That’s the bad news. The good news: the first 90 days of disciplined basics still…
Read More » -
Cyber-Kinetic Security
Cyber-Kinetic Attacks: Safeguarding the Physical World from Digital Threats
Cyber-kinetic attacks are not science fiction but an emerging reality, as early incidents and government exercises have shown. This paper introduced the term to crystallize the concept that digital attacks can have deadly real-world effects. We have outlined how the…
Read More »