A recent experience I had while charging my phone leads me to believe that it is possible to hack a phone through a power outlet. This thought occurred to me while I was attending an Identity Management Conference and had to charge my phone from an ordinary wall outlet. While using my phone I began […]
The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet. This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT […]
Last week, while driving, an advertisement came on the radio for a home security system. I already have a home security system but the ad still caught my attention. As I listened I started to think about how much I pay each month to protect my physical possessions. Then I wondered why I am willing […]
Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.
The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?