Opinions

distributed / decentralized network connections across the globe
teamwork trust hands

tandy 102 laptop

‘Stranger Things,’ data provenance, intelligent systems and data conversion

Season 3 of “Stranger Things” takes us back to 1985 in Hawkins, Indiana, and the magic of the Starcourt Mall. An underlying theme of this show is how the side effects of technology research can lead to adverse consequences. This...

CSO  >  Skull + crossbones on binary code

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

elephant desert tusk ivory postgresql

Of mice and malware

Some of the most important training I got for a career in computer security research was not from a computer-related class, but in a biology class. While these two disciplines may seem entirely unrelated, the skills that are needed in...

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Is the digital identity layer missing or just misplaced?

The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers.

shadowy figure reaching out from behind transparent wall

Forthright handling of cybercrime essential to improved results

While it is has become generally well-known that enterprises have a problem dealing with cybercrime, the true extent of the problem is much worse than many realize. In fact, even the entities that really ought to know the reality –...

mike assante cyber security guru by ryan g poirier

Mike Assante’s lasting impact on critical infrastructure security (and me)

Thanks to Mike Assante, critical infrastructure stakeholders have a better understanding of and ability to respond to cybersecurity risks.

red light / warning / caution / alert / sign of threat or danger

Emerging security threats at the half-year mark

We’ve hit the halfway mark of 2019, and I’m sure that we have all noticed some interesting happenings in the cybersecurity world. I’d like to highlight a few that I’ve found interesting, but also disturbing – and I am sure that there...

holiday security have i been pwned

‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?

The question in my mind about Have I Been Pwned has always been about the value of the service aside from the brilliant analysis and PR generated by its creator, Troy Hunt.

mentor coach teacher student collaborate

Father’s Day and good role models

Father’s Day is a day to celebrate those who take up the role of being one to their children, whether or not they are the biological one, or even the same gender. We need to recognize those who take up that role non-traditionally. We...

artificial intelligence brain machine learning digital transformation world networking

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.

collage of US government icons

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing?

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

5G mobile wireless network technology emerging from smartphone

Privacy by design: Cybersecurity and the future of 5G

History has shown that when we rush to expand computing power and interconnectivity – IoT and cloud tech, to name two – we expose ourselves to new kinds of cyberattacks and bad actors. Can we get it right with 5G?

CSO  >  malware / security threat / skull and crossbones on a user's screens

4 tips for getting the most from threat intelligence

It’s easy to gather data on potential threats, but you have to know what to do with that intelligence if you want to improve your security stance.

The U.S. Capitol building in Washington

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

file sharing / data sync / shared records / eliminating redundancy of multiple identities

Can the re-use of identity data be a silver bullet for industry?

The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen.

Android Notifications

Moving beyond template-based notifications

How to identify your gray area stakeholders for more effective incident response communications.

ethics typewriter keys values morals

Digital ethics rising in importance

We must keep in mind that just because we have the ability to deploy a new technological innovation does not mean that we should. The need to prioritize digital ethics is becoming increasingly important for all organizations that are...

Load More