Opinion

Opinion: Confusion over Vermont Utility Underscores Risks of Cyber Attribution

Opinion: Confusion over Vermont Utility Underscores Risks of Cyber Attribution

In-brief: errant reports about a Russian government hack of a Vermont utility are the first byproduct of a flawed report on Russian hacking of U.S. interests. They won’t be the last. 

Blockchain, which was developed as a way to provide assurance for Bitcoin transactions has applications on the Internet of Things. But first there are some technical hurdles to clear.

Analysis: Three Things May Limit Blockchain Use on the Internet of Things

In-brief: Blockchain technology will have to clear a number of hurdles before it will be ready to serve as a core infrastructure for the Internet of Things, the author explains.

Is the lack of women in the information security field making us more vulnerable to attack? (Image courtesy of defense.gov.)

Opinion: the Lack of Women in Cybersecurity is both a Problem and a Threat

In-brief: The author argues that the devaluation of traditionally “soft” skills like empathy, communication and collaboration in the information security space may be hampering the ability of IT security teams to respond to human-focused threats and attacks.

Hacker Spaces (like the one pictured at University of Maryland) play a pivotal role in fostering innovation and community on the Internet of Things.

On The IOT: The Idea Is the Easy Part

I have a thing for makerspaces and hackerspaces, if you haven’t already noticed from my previous posts. To me, they are the epitome of what I love about the Internet of Things (IoT). It is something I call the democratization of innovation. The maker and hacker movements are global and are changing the landscape. They help to put technology and equipment, the opportunity to learn, develop ideas, prototype, and socialize and network in the reach of many who would not have otherwise had the opportunity just a few years ago. They are, to me, the nucleus of an evolution, if not revolution, of both innovation and society. I like to visit local hacker or makerspaces when I travel. At last year’s Internet of Things Solutions World Congress (IoTSWC) I learned about MADE Makerspace Barcelona, but just couldn’t make it there in person. A visit to MADE was locked into my […]

A survey of registered voters finds that cyber security ranks among their top concerns, according to a poll by Cyberreason. We talk with two experts about why its not a bigger issue on the campaign trail.

Cybersecurity: the other Elephant on the Campaign Trail

In-brief: a survey of registered voters finds that concerns about hacking and cyber security loom large in voters’ minds. So why isn’t there more discussion of cyber security and policy on the campaign trail? In this podcast, Security Ledger editor Paul Roberts talks with Ari Schwartz, the Obama Administration’s former Senior Director for Cybersecurity and Israel Barak, the Chief Security Officer at the firm Cybereason about the other elephant on the campaign trail: cyber security policy and hacking.  With election day just two weeks away, the U.S. voting population is on pins and needles. While polls suggest that this election will not be as close as those in 2008 and 2012, uncertainty is in the air. One major party candidate is warning frequently of a “rigged” process, and the FBI and Obama Administration have pointed the finger of blame for hacks of major Democratic Party organizations at the government of Vladimir […]