Examining the Weak Spots in Tech's Supply Chain Armor
When an attack on the supply chain occurs, manufacturers and purchasers should be better positioned to respond and recover. Even the simplest devices can rely on parts from multiple suppliers, which may have their own suppliers and so on. But every supplier, no matter how small, represents a potential weak link in the chain.
Oct 16, 2018 WorldPost (The Washington Post)
Equifax and the Data-Breach Era
The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?
Oct 18, 2017 The Hill
Digital Theft: The New Normal
Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.
Oct 10, 2016 Wired
Ransomware Hackers Are Coming for Your Health Records
Cyber criminals may be preying on hospitals because cyber protection measures likely have not kept pace with electronic data collection and because hospitals typically do not have backup systems and databases in place, even though such attacks can strain health care systems and potentially put patients' lives at risk.
Apr 11, 2016 Newsweek
How the 'Wonks' of Public Policy and the 'Geeks' of Tech Can Get Together
Conventional wisdom says that technology innovates and disrupts, while public policy regulates and controls. What might a better integration of the commercial tech sector with the policy community look like?
Mar 18, 2016 TechCrunch
How You Can Be Cybersecurity's Strongest Asset
Technology is thoroughly embedded within the average person's life but security is not emphasized to the general user. Teaching the importance of security early on and continually bringing awareness to the public could help temper technology-based attacks.
Feb 18, 2016 The Huffington Post
Keeping Hackers Away from Your Car, Fridge, and Front Door
In the ever-growing Internet of Things, attackers already outpace the defenders. If developing solutions for software liability doesn't become more of a priority, there may be no winning this technological war.
Dec 7, 2015 The National Interest
Social Engineering Explained: The Human Element in Cyberattacks
The human element is the most unpredictable factor in cybersecurity. A social engineer aims to make people do what they want or give the social engineer information, often without the person considering the negative consequences.
Oct 20, 2015 The Cipher Brief
Is It Time to Appoint a Data Security Czar?
Cybersecurity needs to become more of a priority for the government and private corporations. Whatever the solution, public and private officials need to do a better job of weighing the risk-benefit calculation of storing data on Internet-accessible computers and justifying data-handling protocols.
Sep 3, 2015 Newsweek
The Good Hacker: Q&A with Lillian Ablon
Lillian Ablon talks about hacking, winning the DEF CON black badge, women in STEM, and more.
Jan 16, 2015
After a Year of Major Hacks, 2015 Resolutions to Bolster Cyber Security
With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.
Dec 31, 2014 U.S. News & World Report
Hackerazzi: How Naked Celebrities Might Make the Cloud Safer
Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.
Sep 8, 2014 The RAND Blog
The Hackers' Bazaar
Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.
Apr 11, 2014 Politico
Fake Boarding Pass Fears Inflated
Instead of ratcheting back the PreCheck program because of manufactured fears about security lapses, TSA should be encouraged to expand this program to more airlines, more airports and more infrequent travelers, write Jack Riley and Lily Ablon.
Dec 12, 2012 USA Today