Doug Bedell — July 24, 2016, 3:58 pm

Robots Could Have a Bright Security Future

security-robot
SecurityInfoWatch is predicting that robots will be coming into wider use in security settings.

“The idea may seem far-fetched to many,” InfoWatch notes, “but robotics are slowly starting to make their way into physical security. Companies have only begun to scratch the surface of what could be the next game-changing technology for the industry, however, the potential that robotics hold for security is enormous. One only has to look at the buzz generated by the use of commercial unmanned aerial vehicles, more commonly known as drones, to see the disruptive potential of robotics in security…”

And on, and around, they go.

Doug Bedell — July 20, 2016, 3:36 pm

Attend to Hatred, Which Motivates Terrorists

bigstock_Candles_In_Front_Of_The_France_108233822.57891cadf02be
There is a line in Arthur Miller’s play, “Death of a Salesman,” his wife’s despairing tribute to Willy Loman, the defeated salesman: “Attention must be paid…” it cries out. Yes, attention must be paid to a lot of horrendous things these days, not least the promptings of terrorists. SecurityInfoWatch has a post along these lines that we ought to heed.

“If there is one constant playing out in the recent terror attacks in Europe and the U.S. it is that terrorism can occur by inspiration and imitation alone, not by direction,” InfoWatch notes. “Hatred is the key motivational factor and it is too often passed off as ideology.” Sadly, terrorists and many others are victims of a primal emotion, hatred. It can be a key element in security challenges. Be on the watch for it.

Doug Bedell — July 18, 2016, 2:06 pm

‘The Big Hack’ Has New York Snarled in Cyber Risk

images
Bruce Schneier steers us to an unnerving “glimpse” into the near future in which a fancied cyberattack leaves New York City in chaos, “including hacking of cars, the water system, hospitals, elevators, and the power grid.

“Although it is definitely a movie-plot attack,” Schneier muses, “all the individual pieces are plausible and will certainly happen individually and separately.” The doomsday article, entitled “The Big Hack,” is from New York Magazine and makes for chilling reading. May it prove overdone, but only if we’re all alert to such a dire possibility.

Doug Bedell — July 15, 2016, 11:12 am

Horrific Truck Attack Displays a Terrorist’s Intensity

proxy
The horrendous Bastille Day attack by a truck in Nice, France, illustrates how hard it can be to anticipate and stop a terrorist bent on challenging the norms of life or, by extension, security systems.

Security precautions actually didn’t figure in the Nice slaughter. But when a terrorist truck driver can plow through a mile-long column of people, killing and injuring with abandon, we get an anguished sense of how perversely motivated such an attacker can be – and why it’s wise to take whatever security precautions are available for a given sensitive site – barriers or fencing, for example.

Doug Bedell — July 13, 2016, 12:29 pm

Aim: Keeping Security Software ‘Simple’

tracker-mapper
Computer software may well aim to impress by adding more features – and, in the process, becoming more complex. The folks at F-Secure argue, however, that “a good piece of security software doesn’t need the bells and whistles you’ll find on some other products. It just has to provide the protection people need, and it can do a very good job without people even knowing that it’s there.”

We’d say “Amen” to that. Read more on this topic, and view a videotaped talk by Mikko Hypponen, F-Secure’s Chief Research Officer, on the firm’s Safe&Savvy blog post, “When Security makes you say ‘Wow'”.

Doug Bedell — July 11, 2016, 1:18 pm

Computer Security Requires Awareness, Vigilance

MSM-Deployment_thumb
Insuring that your computer/business security is appropriately achieved and maintained involves a lot more than having a password to your desktop. Securosis discusses “Deployment Options – Who owns the security monitoring platform” and where’s it located? – along with various “deployment models”.

It’s well worth considering how much you know about such matters, and getting updated on them as advisable. Computer security is a changing scene.

Doug Bedell — July 8, 2016, 3:10 pm

Digital’s Weight In Security Challenges

imgres
Continuing its focus on the longer-term outlook for corporate security, Security magazine distills the “top ten strategic issues that I (writer Kevin Coleman) have encountered working at the C-level.”

They include a cross-section of what it takes to operate an organization effectively, efficiently and securely in this continually emerging period in which digital capacities and requirements keep arising and pressing for implementation.

Doug Bedell — July 6, 2016, 11:26 am

Seeing the Cyber Security Challenge Whole

holistic-900
The challenge of providing cybersecurity isn’t just a technical one. For organizations, it also has personal dimensions. Therefore, Security Magazine calls for taking a “holistic approach” to corporate security challenges.

“Organizations having the greatest success in preventing attacks (and enduring those that do occur),” Security advises, “are employing a holistic approach to cyber defense. A holistic approach incorporates technical, human and physical factors that are relevant to the detection, prevention, and correction of cybersecurity vulnerabilities.”

Read on in Security for more such helpful guidance.

Doug Bedell — July 1, 2016, 11:42 am

Presidential Politics Prompts Hackers

images-1
“If you’re involved with the 2016 elections,” the Safe & Savvy blog advises, “assume you’re being hacked.” Yes, “Cyber espionage is more and more likely to play a significant role in the extraordinarily consequential elections taking place in 2016.” There have already been instances of it. And the intrusions can come from anywhere in the world.

That’s because a U.S. presidential election has enormous worldwide impact. The post includes discussion of what experts are advising might be done to fend off politically-prompted hackers.

Doug Bedell — June 29, 2016, 1:08 pm

What About the Security Implications of Brexit?

images-1
The British electorate’s vote to leave the European Union “could have profound foreign policy consequences, weakening the web of Western institutions and alliances that have helped guarantee international peace, stability, and security for the 70 years since the end of World War II,” a writer for Government Security News notes.

“‘Brexit’ has no direct effect on NATO,” he adds, “but the referendum was seen positively in the Kremlin, where its leaders view ‘Brexit’ as confirmation that Europe is weak and disunited. This could encourage a more aggressive Russian stance against NATO, viewing Europe as weak and disunited and encourage a more aggressive stance in the future.”