Archives: December, 2017

Doug Bedell — December 29, 2017, 3:15 pm

Steps for Responding to Cybersecurity Attacks in 2018

Wish we could be ending 2017 on a more upbeat note, but cyber security is a key challege of our times. And the Clearswift blog in the UK responds with a scenario for dealing with attacks that it considers all too likely in 2018. “Preparing for the inevitable will make the situation significantly less damaging […]

Doug Bedell — December 27, 2017, 1:31 pm

Fast-Evolving CyberSecurity Threats for 2018

Taking another look at what may be in store for cybersecurity safety in the new year (it’s fashionable, obviously, at this point in Earth’s travels) Security InfoWatch joins the chorus. Then it advises us that “the threat is advancing quicker than we can keep up and the threats change faster than our idea of risk.” […]

Doug Bedell — December 22, 2017, 12:35 pm

Security a Growing Concern on Public Transit Systems

Security, physical or cyber, is becoming a major element of practice in running public transit systems, advises SecurityInfo Watch. “Risks to critical transportation infrastructure include natural disasters as well as manmade physical and cyber threats. Man-made threats include terrorism, vandalism, theft, technological failures, and accidents. Cyber threats to the sector are of concern because of […]

Doug Bedell — December 20, 2017, 3:43 pm

Behind Domestic Violence: ‘We Are Awash In An Ocean Of Guns’

This isn’t news for the holidays, but it’s important to recognize in the growing anxiety over the frequency of mass shootings in the U.S.: The violence often begins at home, between domestic partners. That’s the word from Jim Sawyer, a contributing writer to the Security magazine blog, who warns that “As educators and professionals we […]

Doug Bedell — December 19, 2017, 1:32 pm

A Sure Thing in 2018: Growing Cybersecurity Challenges

The need for ever-more sophisticated skills to recognize and deal with cybersecurity breaches is growing. The DarkReading blog lists and discusses the Top 8 such skills that will be needed in 2018. “IT staffs should be aware that the cybersecurity industry is undergoing a shift from a laser focus on the perimeter to detection and […]

Doug Bedell — December 15, 2017, 4:06 pm

Security Industry Views Repeal of ‘Net Neutrality’ Uneasily

The revocation of “net neutrality,” approved this week by the Federal Communications Commission and to become evident in the next few months, has security industry officials especially concerned, advises Security InfoWatch. “Our biggest concern is that an Internet provider who also provides alarm services can throttle or block the services of an alarm company in […]

Doug Bedell — December 11, 2017, 10:56 am

Meet the ‘Good Guys’: White-Hat Hackers

Steve Zurier on the DarkReading blog fills us in on who the “good guys” are in seeking to keep the Internet reasonable free of hackers. “Most knowledge-seekers,” Steve explains, “have been involved in the bug bounty scene for less than two years and want to learn more. Bugcrowd reports that 63% say they invest their […]

Doug Bedell — December 8, 2017, 1:40 pm

Perimeter Security Involves Length, Sizes and Values

You may think that securing a perimeter is simply a matter of putting up a fence and letting it be. Not so, notes the Advanced Perimeter Systems blog. It depends on the perimeter in question and what’s inside it. Here, for example, are three perimeter settings – an international airport, the Great Pyramids of Giza […]

Doug Bedell — December 6, 2017, 4:00 pm

‘Phishers’ and ‘Spear Phishers’ Explained

Phishing and spear-phishing – the difference between these two forms of cyber security attacks is explained in a TechCrunch post. “Spear-phishing, like phishing, involves emailing a malicious link or file. Whereas phishers send mass emails in hopes of stealing credit card information, Social Security numbers and login credentials from as many people as possible,” Tom […]

Doug Bedell — December 4, 2017, 1:18 pm

A Security Tale: Truant With a Plastic Bag

Here’s an off-the-beaten path piece from Naked Security about the efficacy of almost anything an employer might issue to track his or her employees during business hours. The employer of an electrician in Australia issued a GPS-enabled personal digital assistant (PDA) to an employee who, sad to say, placed it in an electrically conductive “cheese […]