Archives: July, 2016

Doug Bedell — July 29, 2016, 9:06 am

Refresher Time: Strong Computer Passwords

Security InfoWatch provides a treatise on computer password security – a reminder of how critical good passwords are to deterring hackers, and what constitutes a strong password vs. a weak one. It doesn’t hurt at all – and may well provide extra protection – to be conversant on the elements of a dutiful password. The […]

Doug Bedell — July 27, 2016, 2:31 pm

Border Patrol Training In the Spotlight

Here, on the Homeland Security Department’s site, is one of the most challenging security jobs we can currently imagine – membership in the U.S. Border Patrol. U.S. Customs and Border Protection Commissioner R. Gil Kerlikowski has overall responsibility for border security and Dan M. Harris, Jr., is the new Chief of the U.S. Border Patrol […]

Doug Bedell — July 24, 2016, 3:58 pm

Robots Could Have a Bright Security Future

SecurityInfoWatch is predicting that robots will be coming into wider use in security settings. “The idea may seem far-fetched to many,” InfoWatch notes, “but robotics are slowly starting to make their way into physical security. Companies have only begun to scratch the surface of what could be the next game-changing technology for the industry, however, […]

Doug Bedell — July 20, 2016, 3:36 pm

Attend to Hatred, Which Motivates Terrorists

There is a line in Arthur Miller’s play, “Death of a Salesman,” his wife’s despairing tribute to Willy Loman, the defeated salesman: “Attention must be paid…” it cries out. Yes, attention must be paid to a lot of horrendous things these days, not least the promptings of terrorists. SecurityInfoWatch has a post along these lines […]

Doug Bedell — July 18, 2016, 2:06 pm

‘The Big Hack’ Has New York Snarled in Cyber Risk

Bruce Schneier steers us to an unnerving “glimpse” into the near future in which a fancied cyberattack leaves New York City in chaos, “including hacking of cars, the water system, hospitals, elevators, and the power grid. “Although it is definitely a movie-plot attack,” Schneier muses, “all the individual pieces are plausible and will certainly happen […]

Doug Bedell — July 15, 2016, 11:12 am

Horrific Truck Attack Displays a Terrorist’s Intensity

The horrendous Bastille Day attack by a truck in Nice, France, illustrates how hard it can be to anticipate and stop a terrorist bent on challenging the norms of life or, by extension, security systems. Security precautions actually didn’t figure in the Nice slaughter. But when a terrorist truck driver can plow through a mile-long […]

Doug Bedell — July 13, 2016, 12:29 pm

Aim: Keeping Security Software ‘Simple’

Computer software may well aim to impress by adding more features – and, in the process, becoming more complex. The folks at F-Secure argue, however, that “a good piece of security software doesn’t need the bells and whistles you’ll find on some other products. It just has to provide the protection people need, and it […]

Doug Bedell — July 11, 2016, 1:18 pm

Computer Security Requires Awareness, Vigilance

Insuring that your computer/business security is appropriately achieved and maintained involves a lot more than having a password to your desktop. Securosis discusses “Deployment Options – Who owns the security monitoring platform” and where’s it located? – along with various “deployment models”. It’s well worth considering how much you know about such matters, and getting […]

Doug Bedell — July 8, 2016, 3:10 pm

Digital’s Weight In Security Challenges

Continuing its focus on the longer-term outlook for corporate security, Security magazine distills the “top ten strategic issues that I (writer Kevin Coleman) have encountered working at the C-level.” They include a cross-section of what it takes to operate an organization effectively, efficiently and securely in this continually emerging period in which digital capacities and […]

Doug Bedell — July 6, 2016, 11:26 am

Seeing the Cyber Security Challenge Whole

The challenge of providing cybersecurity isn’t just a technical one. For organizations, it also has personal dimensions. Therefore, Security Magazine calls for taking a “holistic approach” to corporate security challenges. “Organizations having the greatest success in preventing attacks (and enduring those that do occur),” Security advises, “are employing a holistic approach to cyber defense. A […]