The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology
Mar07

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

Fluid, agile and accessible – the malicious use of technology can range from simple, uncoordinated attacks to complex, highly coordinated persistence. Figuring as tool in the commission of a crime or as a delivery system to exploit many vectors, ‘technology for bad’ is not new, but what we have seen recently is – and it’s troubling. When mixed with...

Read More
Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity
Feb26

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

Whether it is a malicious attack or an inadvertent release on protected or classified data, a breach of government data can level a severe blow to integrity and reputation, leading to legal and legislative consequences that impact partners, allies and the public. For those reasons, cybersecurity and privacy practices for the protection of electronic information go hand-in-hand. The verification...

Read More
What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated
Feb05

What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated

A little over a year ago, I had the pleasure of presenting at CANARIE’s 2017 National Summit in Ottawa with my good friend, Roni Zehavi, CEO of Israel-based CyberSpark. A cross-section of scientists, practitioners, academics, entrepreneurs and professionals, the Summit showcased the interconnectedness of science, society and cyber–how it began, its evolutionary path, and what the future holds as this global convergence unfurls...

Read More
Implied Trust … in Supply Chain Security – Part Two
Nov09

Implied Trust … in Supply Chain Security – Part Two

Last month, my column “Implied Trust, Presumed Secure and Other Dangers of Supply Chain” covered supply chain security in the context of the network breach of a contractor for the Naval Undersea Warfare Center (NUWC) by Chinese hackers. Much to the US Navy’s chagrin, while the pilfered 614 gigabytes of US Navy data was unclassified, when aggregated it could...

Read More
Implied Trust, Presumed Secure and Other Dangers of Supply Chain
Sep07

Implied Trust, Presumed Secure and Other Dangers of Supply Chain

The US Navy’s Naval Undersea Warfare Center (NUWC) bills itself as a “full-spectrum research, development, test and evaluation, engineering and fleet support center for submarines and autonomous underwater systems”. Clearly, its assets would be attractive to malicious actors and rock-solid security processes, especially in the supply chain would be assured without exception. Not so, as recently revealed when a...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube