This is part of an ongoing series on the National Strategy for Trusted Identities in Cyberspace. The introduction to this series can be found here.
One of the goals of the National Strategy for Trusted Identities in Cyberspace (NSTIC) is to support a wide range of use cases. These might include everything from low-value purchases to making adjustments to critical infrastructure, like power systems, where someone might get hurt if an unauthorized action takes place.
Read More »
Tags: identity, NSTIC, NSTIC Series, privacy, security
In this week’s Cyber Risk Report we briefly discussed the fact that millions of individuals are victims of their own carelessness by freely posting information such as vacation plans and family photos on social networks and by storing Personally Identifiable Information (PII), such as medical records and financial information, on mobile devices. Users are sometimes not properly educated when it comes to what types of information should be shared, and with whom they should be sharing this information. This lack of education and subsequent “overposting” of personal details is now trickling down to our youth, some of whom are under the legal age to even utilize some of these social network sites. Read More »
Tags: cyber security, facebook, security, social networking
Remember the old days when work meant sitting at your desk, typing away at your desktop computer, at the office? There was no such thing as a smart phone or even a laptop or a tweet – you just sat at your desk and waited for the network, which was probably running at 56k dial-up speeds or slower. (Now I probably sound like my father who told me he had to walk uphill to school in the snow every day.)
These days, we don’t need to be tied to a desk, but we also expect much more of our networks: they need to be fast, secure, run the applications we need, and allow employees to work anywhere, anytime, and on any device.
So how to design an enterprise network with enough flexibility and security to address users’ needs without CIOs and IT managers having coronaries in the process? And how can enterprise networks live harmoniously (and securely) with our many devices, from smart phones to iPads to laptops?
As we continue the Seven Myths of the Good-Enough Network series over on Silicon Angle, Cisco’s Mike Rau–Vice President, CTO for the Borderless Network Architecture–tackles those questions and more as he dispels the second myth: bolt-on security.
What exactly is bolt-on security anyway? Read More »
Tags: any device, bolt, bolt-on, borderless, Cisco, customer, debunk, iPad, iphone, mike rau, myths, network, partner, security, sevenmyths, silicon angle
I was the recently on the wrong end of a 488. For those of you who aren’t familiar with the California penal codes, that’s a petty theft. My laptop, PS3, and iPad are gone, taken from me. At this point, I can only hope that my things broke in the act of the robbery and are rendered useless.
Unfortunately, hope and $3.50 will get me a café latte and that latte cannot secure my precious data at this point; my saved passwords, tax returns…the keys to the castle. Our devices are increasingly holding more important information and when these devices get compromised, so does our sensitive data.
Read More »
Tags: data, mobile, mobile devices, protection, security
On June 1-2, I will be participating in the EastWest Institute’s (EWI) second Worldwide Cybersecurity Summit at the Queen Elizabeth II Conference Center in London, and I’m very excited about the prospects for this event.
EastWest Institute is a global, action-oriented, “think-and-do” tank founded in 1980. Its goals are to mobilize leading business and government leaders to address cross-border cybersecurity challenges; set new models for private-public-sector leadership in addressing high-priority security threats and vulnerabilities; and to make advances on the most pressing issues in global management of critical information infrastructure with breakthrough international collaboration.
I’m particularly energized about this year’s session, as I anticipate we will continue and expand upon the dialogue initiated at last year’s inaugural summit in Dallas. I’m proud to have participated in that event, along with other government, business, and civil society leaders from around the world who came together to collaborate on ways to assure the security of the world’s digital infrastructure.
Read More »
Tags: cybersecurity, security