Archives: February, 2020

Doug Bedell — February 26, 2020, 3:12 pm

Security’s ‘Sixth Sense’: An Indispensable Asset

Security starts in places you might not think of at first blush. You’ve got to go back a few steps, months or years, to get the history of a setting. An example comes via SecurityInfowatch.com, in the person of a school security professional who learned the hard way that “at the end of the day […]

Doug Bedell — February 24, 2020, 3:29 pm

Data Breach Exposes Personal Information of White House Employees

Think you’ve got problems in securing your office from cyber intrusions? Well, be glad you’re not working at the White House where, reports threat post, “A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.” So, it looks like it can happen anywhere. Evidently someone at the […]

Doug Bedell — February 21, 2020, 4:02 pm

Perspective On This Year’s Flu Season

A bit of perspective never hurts, especially in the context of the fear of Coronavirus during this year’s flu season. Might we be overreacting to the Chinese flu virus? asks Danny Kaine on the Security blog. “As employers, educators and insurers, we all have a duty of care to our travelers and want to provide […]

Doug Bedell — February 19, 2020, 9:09 am

Wireless Locks Allow Full Security Control

Wireless locks may be “one of the best ways to secure a variety of exterior and interior perimeters within a single facility,” like a campus setting, SecurityInfowatch.com advises. “One of the best ways to secure a variety of exterior and interior perimeters within a single facility is by using wireless locks. Like all electronic locks, […]

Doug Bedell — February 17, 2020, 10:25 am

Federal Standards for Secure Voting Machines Need Updating

Here’s a report on the DarkReading blog discussing “How Can We Make Election Technology Secure?” That’s a timely topic for sure. “Our elections have been menaced by social media deception, voter registration scandals, conspiracy theories, and polarization of the electorate. While these issues must be confronted, we can’t ignore the growing threat posed by security […]

Doug Bedell — February 14, 2020, 1:05 pm

Locked Out of the Internet: It Really Happened

Bruce Schneier provides a report on how engineers flown into two U.S. locations from around the world to do a security check on the Internet – the whole global information system – couldn’t hold the ceremony because one of the two safes at the heart of the exercise couldn’t be opened. That was on a […]

Doug Bedell — February 12, 2020, 7:58 am

U.S. Disease Context for the Corona Virus

In Homeland Security provides context for the world’s current disease concern, “We Should Panic about the Flu, Not the Coronavirus.” “As with most viruses that originate outside America, the public’s interest is only piqued when the virus spreads to America. That is what’s happening now,” Glynn Casker, Managing Editor of In Homeland Security, writes. “Currently,” […]

Doug Bedell — February 10, 2020, 4:45 pm

School Security Gets a Boost from Cooperating Federal Agencies

A coalition of federal agencies has created SchoolSafety.gov, a website to help keep school communities safe. The U.S. Department of Homeland Security is joined in the initiative by the U.S. Department of Justice and the U.S.Department of Health and Human Services Earlier, in March, 2018, the Federal Commission on School Safety was established to help […]

Doug Bedell — February 7, 2020, 12:07 pm

Corporate Boards Increasingly Doing Cyber Diligence; Get Aboard

A year ago, notes the Security blog, Yahoo’s board agreed to pay $29 million to its shareholders after cyberattacks that compromised three billion Yahoo user accounts. “It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying […]

Doug Bedell — February 5, 2020, 12:39 pm

Who’s Got the Skills, and Aren’t They Worth Them?

Who’s got the smarts in cybersecurity? The question is bandied about when the underlying assumptions need to be questioned, writes Carla Wasko on the Dark Reading blog. Ms. Wasko thinks there is plenty of cybersecurity talent available, but potential employees need to be better appreciated. They’re not simply “hackers” or whatever. Potential employers have some […]