Overcoming the Equation: Security = Friction

blueprint-close_00339844

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Not bad, but suppose policy requires 12 or more characters; we have to pad the password: […]

The Internet of (Secure) Things – Embedding Security in the IoT

hpinternetofthings

We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. The underlying technology enabling IoT is Machine-to-Machine (M2M) communications. Your running shoe tracks your workouts, sending the data to a mobile app. Your wristband tracks your […]

Nextgov Enables Examination Of Big Data’s Role in Cybersecurity

big-data-eye

Three highly regarded community technologists will meet in a NextGov morning event 3 June 2014 to examine Big Data’s Role in Cybersecurity. Details from the invite: When addressing cybersecurity, it is tempting to think that strengthening walls is enough to prevent unwanted intruders–yet data breaches continue to occur at alarming rates. Facing increasingly sophisticated adversaries, bigger […]

Domestic “Drones” Are the Latest Object of Threat Inflation

domesticdrones

Recently, several news outlets reported on a supposed plot by a Moroccan national to use remote controlled model airplanes as flying bombs. The story seems to lend credibility to speculation that model airplanes could be the next terrorist threat. In reality, however, these fears are part of a larger pattern of threat inflation about domestic […]

Couldn’t Attend @FedCyber? Catch What You Can Here

fedcyber (7)

FedCyber hosts events that are off the record. We do that because this is a gathering to work big issues and we need an environment where real decision-makers can feel free to speak their mind. Attendees capture info to take back to their organizations, and some summary minutes and action items are captured, but that […]

Is DHS’ acquisitions program becoming unaffordable? U.S. Energy Department spends $30M to bolster utility cybersecurity tools and more

Here are the top cyber news and stories of the day. Is DHS’ acquisitions program becoming unaffordable? The DHS is under a lot of intense scrutiny lately to re-vamp their acquisition processes in the face of allegations and revelations of inefficiencies and waste. One specific example was from the $3B expenditure on radio upgrades, 8,000 […]