Category: systemic risk
Cloud computing concentration and systemic risk
I came across an interesting blog post over at Finextra which got me thinking about a topic that has been in the back of my…
Another killer woodpecker
Way back in 1977, a computer scientist from the University of Nebraska coined “Weinberg’s law:” If builders built buildings the way programmers wrote programs, then…
Just how effective are Russian political social media ops?
There has been a lot of discussion (and hand wringing) over what seem to be concerted Russian “influence operations” aimed at US politics. Our Russian…
Snail mail hacking
Some of the most effective hacks don’t require the attacker to touch your computer. This article from Flashpoint provides some insight into how criminals are…
Deepfakes – Welcome to the post truth society
I recently watched the New York Times’ Weekly episode “Deepfakes – Believe at Your Own Risk” and while I have been concerned about the implications…
Something about (Japanese) foxes and hen houses
Not strictly a security story, but interesting and alarming… Japanese authorities have decided that: It is permissible to make contributions to politicians using cryptocurrencies like…
WordPress wants sites to eat their (patching) vegetables
Apparently. over a third of the web sites on the Internet (including this one) run the WordPress content management software package. Natch, this makes WordPress…
So your third party has been breached…
Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed that a small number of…
als, bls, cissp
Those of you who have the misfortune to know me personally know that information security is but one piece of the pie that is Al…
insecure systems? no insurance for you!
It seems that car thieves have been targeting the keyless entry systems of high end vehicles, taking advantage of insecure security in their on board…