Monthly Archives: June 2014

Understanding Deterrence & Crime Prevention

Originally posted on Global Security, Privacy, & Risk Management:
This following an excerpt from the 2012 research brief titled “Failed State of Security; A Rational Analysis of Deterrence Theory and Cybercrime.”  I was recently provided a blog post by an…

Posted in Uncategorized | Leave a comment

“You Can’t Unring That Bell!” – What is a”Data Breach” and When Should I Notify?

Originally posted on Global Security, Privacy, & Risk Management:
There are currently over 45 state breach notification laws, several data protection laws, and numerous regulations including PCI DSS, HIPAA/HITECH, FISMA, and more.  I frequently find myself working with companies on…

Posted in Uncategorized | Leave a comment

Offensive Cyber Attacks – A Dangerous Proposition

Originally posted on Global Security, Privacy, & Risk Management:
Let me preface this by saying I have been outspoken about passive cyber defensive strategies and their failure.  You can read my paper: “Failed State of Security” to learn more.  On…

Posted in Uncategorized | Leave a comment

”Active Responses” to CyberAttacks are Losing Propositions

Originally posted on Global Security, Privacy, & Risk Management:
“Everyone has a plan until the’ve been hit” – Joe Lewis Having spent numerous years providing armed and unarmed physical security in combat zones, hospital emergency rooms, psychiatric wards, and anti-piracy operations…

Posted in Security Concepts | Tagged , , , , , , , | Leave a comment

SC Magazine; The Need and the Challenge to Define Security

Read the entire article in Feb, 2014 edition of SC Magazine “While used every day, the term “security” can be deceptively difficult to define and may contain various meanings to different people in divergent contexts. The industry at large seems … Continue reading

Posted in Security Concepts | Tagged , , , , , , | Leave a comment

Security 101; Security, Exploits & Vulnerabilities

Originally posted on GlobalRiskInfo February, 2012. In light of the recent disclosures of breaches of major security technologies and vendors, I felt compelled to write this post.  One of my favorite subjects to debate (and argue over) is security theory … Continue reading

Posted in Security Concepts | Tagged , , , , , | Leave a comment

Snipers, Gun Control and Causality…oh my!

Originally posted on Global Security, Privacy, & Risk Management:
With yet another shooting in the news, the debate is again raging about gun control. I personally believe these are healthy debates but I am often frustrated by the seemingly illogical…

Posted in Uncategorized | Leave a comment