by John

The author and RAND researchers recently wrote a paper detailing their findings on how cyber insurers understand and price risk.

Posted in Cybersecurity & Infosec, Risk Management

by John

John McAfee decided what we really needed was physical, not software switches in our phones. Makes sense. You want to know the Wi-Fi is off, an analogue switch will ensure it.

https://www.mgtci.com/privacy-phone-voucher/

Posted in Cool-Stuff, Emerging Technology, Privacy

by John

Major General Brett I. Williams discusses the distinction between cyberwarfare and information warfare. The distinction can be important!

http://www.c4isrnet.com/articles/cyberwarfare-and-information-warfare-must-be-distinguished-commentary

Posted in Blog, Cybersecurity & Infosec, Nation State

by John

Solomon Smith and I presented at the Spring ISACA meeting in Iowa City, IA today on cyber education. 

http://alignedsecurity.com/index.php/2017/04/25/illowa-isaca-cyber-education-presentation/

Posted in Blog, Community, Cybersecurity & Infosec, Events

by John

There are certainly many technological and ethical considerations when developing brain-machine solutions, but Elon Musk formed Neuralink to explore this next frontier of human evolution. This is worth a read.

Posted in Cool-Stuff, Science

by John

Home | The Security Cards: A Security Threat Brainstorming Kit

The University of Washington has developed a set of 42 playing cards for modeling security and privacy threats. The cards encourage you to brainstorm about potential threats along 4 dimensions: Read More

Posted in Cool-Stuff, Cybersecurity & Infosec, Exploits & Attacks

by John

Google’s Health Study Seeks 10,000 Volunteers to Give Up Their Medical Secrets

Are you willing to share your most intimate medical information with Google health spinout, Verily? Volunteers agree to undergo various invasive medical procedures and wear tracking devices for four years. Read More

Posted in Medical, Privacy, Science

by John

This article has some very good insights regarding what board members say they want and what they are getting from CISOs. They still tend to be skeptical of risk presented as loss predictions in dollars. Storytelling still has an important role to play.

Posted in Cybersecurity & Infosec, Risk Management