menu

Topic:

Cybersecurity

Big Retail – The Next Critical Infrastructure?

By Gary Warner
This week, President Obama unveiled a set of guidelines issued by the National Institutes of Standards and Technology and a new public-private partnership program. While I join with others in applauding Mr. Obama’s creativity in making progress in protecting our nation’s cyber infrastructure, it is important to note what is and what is not being addressed by these guidelines. Where, for example, does the Target Breach fall?

Top 3 Security Issues to Watch in 2014

Of all the big stories to keep your eye on for 2014, what are three, base-level “working-stiff” issues? They are mobile computing, defense readiness, and the connection between Special Operation Forces and intelligence. If we can get these right, it would take us a long way towards better security.

A Bitcoin For Your Thoughts

Bitcoin is a new digital currency. The Cyber age has vastly changed our day-to-day relationship with money, and Bitcoin is here to stay in some shape and form. But is it real money? The bottom line is simple: as people accept Bitcoin as a means of exchange for goods and services, then it’s a currency.

Are We Abandoning Supply Chain Cybersecurity?

Insiders have said that Cyber Coordinator Mike Daniel will drop Supply Chain Security from his pending revision of the Obama cybersecurity policy. Dropping one of the most crucial aspects of cyber as a point of focus would be unfortunate. Active supply chain security for cyberspace is absolutely required if we are to get ahead – and stay ahead – of the numerous threats we face.

DHS Nominee Johnson Shy of Expertise in Key Areas

The Honorable Jeh Johnson has been nominated to replace the long departed Secretary of the Department of Homeland Security (DHS) Janet Napolitano. Strangely, President Obama has portrayed Johnson as a highly qualified candidate. The President seems to be the only one who is impressed. There are a couple of major holes in Johnson’s resume.

Johnson Nominated for DHS Secretary – What Does That Tell Us?

The anticipated nomination of Jeh Johnson to become the fourth DHS Secretary is welcomed news almost any way you look at it. Johnson’s prodigious resume and professional history is being chronicled by the homeland security, defense and legal establishment writers. Most of those stories will focus on Johnson’s past experience at the Pentagon, but here are the five most pressing issues he ought to address in his confirmation hearing, as well as his tenure as Secretary (should that occur).

Cyber Space – A New Age, A New Way

As I kid, I loved Superman. Able to leap tall buildings in a single bound. Hiding his identity like a spy. But who was he? “It’s a bird? It’s a plane? No, it’s Superman.” The reason I bring up this dusty piece of nostalgia is my mind drifts toward it every time I hear someone […]

On the Cusp of Another 9/11 Anniversary

The Department of Homeland Security has been at the mercy of the White House, and nowhere has there been a greater concern than in the seeming lack of urgency in filling vacant positions. What else (other than incompetence) could explain the failure of this Administration to fill the multitude of vacant and dual-hatted positions in DHS leadership? As President Obama is likely to say in his Tuesday night national address, America must take action. Concerning DHS, the President should follow his own advice.

NATO Meeting to Address Alliance Cybersecurity and Defense

At the beginning of June, NATO held the first Alliance meeting of ministers dedicated exclusively to the subject of cyber defense. this comes at a time when countries are strapped for funds and citizens have little appetite for additional defense expenditures. In the months ahead, NATO will decide how to support members that are the target of cyber attack and request aid. As always, the real test resides in the manner and extent to which agreed-upon principles are operationalized.

Unexpected Risks of Intelligent Infrastructure

In 1999 a technology manager called Kevin Ashton coined the phrase “The Internet of Things”. Today, these “things” now include elements of our critical national infrastructure via what are called SCADA (Supervisory Control And Data Acquisition) systems or ICS (Industrial Control Systems). Unfortunately, these systems can be just as vulnerable to attack as our laptops.