In 2017, real action on cybersecurity will happen after loss of life

In 2017, real action on cybersecurity will happen after loss of life

Post describing the possibility of a hybrid terrorist attack involving a conventional, real-world component amplified by a simultaneous distributed denial of service attack directed at first responder computing infrastructure.

01/05/17

Solve cybercrime by permanently linking physical space and cyberspace

Solve cybercrime by permanently linking physical space and cyberspace

A discussion of how to dramatically reduce cybercrime, cyber-terrorism, and cyber-espionage by using biometric credentials for internet transactions.

12/05/16

Cybersecurity woes can be remedied through decentralization

Cybersecurity woes can be remedied through decentralization

France recently announced the creation of a single database to store information on 60 million holders of French identity cards and passports. The 2014 hack of the Office of Personnel Management demonstrates why this is a very bad...

11/22/16

Fraud and privacy problems on the blockchain

Fraud and privacy problems on the blockchain

Enemy at the Gates post explaining blockchain vulnerabilities that open opportunities for fraud and describing privacy problems introduced by potential fraud countermeasures.

11/07/16

How to stop the Army of Things

How to stop the Army of Things

On Oct. 21, a massive distributed denial of service attack employing thousands of compromised internet connected devices brought down dozens of company websites. Private businesses must lead the offensive against the ‘Army of Things’...

10/27/16

Time to destroy the hacker’s ballistic missile

Time to destroy the hacker’s ballistic missile

A blog post for 'Enemy at the Gates' using the recent SWIFT hacking incidents to show the need for replacing conventional email technology. In addition to illustrating the cybersecurity vulnerabilities inherent in current email...

10/17/16

Load More