Archives: April, 2016

Doug Bedell — April 27, 2016, 8:11 am

‘Cicada’ Drones Raise a Possible New Security Concern

The U.S. is turning to mini-drones – named Cicadas, for Close-In Covert Autonomous Disposable Aircraft – to target terrorists abroad, advises In Homeland Security. They look like birds flying high. How long will it be, we wonder, before Cicadas have civilian market counterparts that will prompt new concerns over security breaches?

Doug Bedell — April 25, 2016, 9:26 am

Consider Using Virtual Reality As a New Security Tool

Figure out how to apply virtual reality techniques to your security challenges. The U.S. Navy has. The Office of Naval Research is advising that personnel at Pearl Harbor (certainly an appropriate location) are using virtual reality gear in simulated combat. “’This is the future of training for the Navy,’ Dr. Terry Allard, head of the […]

Doug Bedell — April 21, 2016, 11:16 pm

Airport Security Provides Exemplary Discipline

Protect an airport well and you can protect just about anything. That’s the feeling you get from reading A SecurityInfoWatch post on airport security. The Transportation Security Administration definitely has a challenging job seeking to insure the safety of the nation’s airports. Yet securing any location has its own problems and issues. The need is […]

Doug Bedell — April 20, 2016, 2:15 pm

Maintaining Electronic Security – “A Lot Like Having Kids”

Protecting computer-based data and the security systems – physical as well as electronic – that it supports “is a lot like having kids,” says Hans Holmer of the Security Industry Association (SIA). Really? Yes, indeed. “You child-proofed your home before your child was born, and you probably still worry for your kid(s) even now when […]

Doug Bedell — April 18, 2016, 11:27 am

A Future of Digital Security Challenges

InfoWorld Advises – Get ready for the security challenges of the future. They’re going to become increasingly digital, frequent and hard to anticipate. It could be an anxious time.

Doug Bedell — April 15, 2016, 11:11 am

ISO Security Standards Developed With Hacker Cooperation

Katie Moussouris on Threat Post Op-Ed discusses developing vulnerability standards on the Internet. They’ve been advanced by “working cooperatively with the hacker community.” Presumably, that’s the friendly hacker community.

Doug Bedell — April 12, 2016, 7:19 pm

Lotteries Require Luck, and Trust In the Operators

Bruce Schneier comes up with a post that leaves you wondering whom you can trust – not the former security director of the U.S. Multi-State Lottery Association, for example. That gentleman, Eddie Tipton, Schneier advises, “installed software code that allowed him to predict winning numbers on specific days of the year, investigators allege. The random-number […]

Doug Bedell — April 8, 2016, 9:10 am

Curiosity and ‘Found’ USB Drives – Don’t Open Them

People have insatiable curiosity, sometimes unfortunately. As when they pick up a USB drive that someone else may have discarded or lost and plug it into their computers – just to see what’s there. Almost half of the USB drives that were discarded in a test at the University of Illinois, reports Naked Security, were […]

Doug Bedell — April 4, 2016, 11:28 am

Employee Awareness An Asset In Site Security

Turning to employees and encouraging their input on security concerns can help strengthen a site’s safety. Keen observations on employee input come in this Security magazine post from a hospital setting. But they apply to employee awareness generally. Tim Portale, Chief Safety and Security Office of HCA (Hospital Corporation of America) observes that HCA ” […]