Opinion

The Internet of Things is raising the stakes of destructive, cyber physical attacks, Bruce Schneier argues in his new book, Click Here to Kill Everybody.

Podcast Episode 111: Click Here to Kill Everybody and CyberSN on Why Security Talent Walks

Podcast: Play in new window | Download (Duration: 59:10 — 67.7MB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s podcast (episode #111), sponsored by CyberSN: what happens when the Internet gets physical? Noted author and IBM security guru Bruce Schneier joins us to talk about his new book on Internet of Things risk: Click Here to Kill Everybody. Also: everyone knows that cyber security talent is hard to come by, and even harder to keep. But why does precious cyber talent walk? In our second segment, we’re joined by Deidre Diamond of cyber security placement firm CyberSN, who has all the answers.

Electronic voting machines have been shown to be vulnerable to hackers.

Opinion: The Corporate Lessons of Election Hacks

Recent demonstrations of election hacks are about more than ballots. They also contain important lessons for enterprises,  Security Ledger Editor in Chief Paul Roberts argues in this opinion piece. (Note: this post first appeared on Hitachi Systems Security* web site.)

Blue chip manager is unlocking a virtual locking mechanism to access shared cloud resources. Internet concept for identity & access management, cloud storage, cybersecurity and managed services.

Collection Management: a Crash-Course

Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program.