vulnerability


The Russians are coming? Why Attention to Cyber Defense is more critical than ever

The new-found “Red Scare” arising from the revelation of Russian-government directed cyber attacks against the U.S., reminds me of a wonderful line from the movie “Casablanca.”  Captain Renault, a reluctant Vichy-police official with rather flexible views on the vice of gambling, is pressured by the Nazi’s to find any pretext to close down “Rick’s American Café.”  Summoning all the false outrage he can muster, Renault struts into the Café amid a police raid and declares […]


Physical Security in a Cyber World

“Physical Security in A Cyber World” proved to be one of the most interesting panel discussions during last month’s ASIS International Annual Seminar & Exhibits in Anaheim, California. It featured a mixture of end user, manufacturer, cyber security consultant, and physical security consultant insights that together provided a multifaceted view into the complex security issues involving cyber and physical overlap.  Hosted by Convergint Technologies, the panelists were Mike Taylor(Executive Director of Global Security at Sony Pictures), […]


Securing the Security System Network

When I sat down in 2007 to write the first edition of Integrated Security Systems Design, part of the driving force was that I was finding integrated security system IP networks were, for the most part, unsecured. Tragically, eight years later, that situation has not changed very much. Think about that for a moment. The security system that a multi-billion dollar organization relies upon to protect its corporate headquarters may reside on a network that is […]


Sony, NERC & Cyber Vulnerability

To the chagrin of just about everyone, Sony capitulated to the hacker’s demands and threats – sending absolutely the wrong message.  What was Sony thinking? From a long-term view and national perspective, the action they took was in error. If you give in to the demands of terrorists, they will be emboldened to attack again. Further, there is a ripple effect – other threat actors around the world are watching and are inspired by the […]