Articles
A Case for the Liberal Arts in Cybersecurity
I have a great job. As a Global Threat Analyst, I provide intelligence analysis to senior executives and security teams at Cisco. I focus on the confluence of global political trends and advanced persistent cyber threats. People frequently ask me how I got such an interesting job. I started as an En…
Espionage in the Internet Age
If you had asked me a few years ago, I might have predicted that the rise of large scale hacking and network-based Advanced Persistent Threats (APTs) would spell the end of old-school espionage (poison-tipped umbrellas, office break-ins, dangles and the like). Those of us who fancy ourselves logical…
The Seven Deadly Sins of User Access Controls: Part I
2014 was a terrible year for corporate data breaches. If there is to be any silver lining, information security professionals must draw lessons from the carnage. A good place to start is to identify common denominators. Several of the most damaging incidents started with phishing emails into office…
Geopolitical Trends in Cybersecurity for 2015
New year predictions generally take one of several forms: broad generalizations about multi-year trends, guesses about what might happen, or overviews of recent events disguised as predictions. The first is too easy, the second—going out on a limb—risks missing the mark so badly as to be useless. So…
Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software
Listening to the radio on the way to work recently, I heard that hackers had stolen some 1.2 billion usernames and passwords, affecting as many as 420,000 websites. When asked what listeners could do to protect themselves, the security expert speaking recommended changing passwords. He did not menti…
Our Unofficial Top Ten Cyber Trends for 2014
(I pulled this list together with the help of my colleague Martin Chorich. Or maybe it was the other way around. ) Every year, publications ranging from supermarket tabloids to serious academic journals issue forecasts for the coming year. Those with foresight hold on to these articles and read them…
Sovereignty and the Internet
Add this to your list of parties spoilt by the Internet revolution: national sovereignty. We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social…
Bringing Up the Social Media Baby
According to a Nielsen study, social media is no longer in its infancy. No kidding. During the November military confrontation between Israel and Hamas, social media played a very grown-up role. What distinguished it from past politically-charged social media exchanges was the participation of sta…
8