From working on the Hanover hackers’ case with Dr. Cliff Stoll as described in The Cuckoo’s Egg to re-exploring a nearly 50 year old cold case of the infamous hijacker – DB Cooper – and a lot in between, Jim Christy has been a leading pioneer in the field of digital forensics and computer crime […]

Coming up with an assessment of cyber risk that is meaningful and actionable tends to be a task where practitioners consistently come up short. You are often stuck with two extremes – one extreme saying simply that the sky is falling which doesn’t leave you much room for understanding your options or taking risk reduction […]

I recently attended the Fifteenth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective at the University of Maryland. The forum was hosted by Professors Lawrence A. Gordon, Martin P. Loeb, and William Lucyshyn. You may remember the interview I did with Professor Gordon a while back on his collaboration with Professor […]

I remember reading a novel several years ago by Tom Clancy that featured virtual reality (VR) as part of the plot’s security operations center capabilities. I remember thinking how this will never happen in my lifetime and how Clancy was getting way ahead of himself. Then, recently I was able to attend a conference about […]

Finding the right security solution is often a difficult task, with many complex trade-offs to consider. Building a secure system is even more challenging as history has shown. Designing and building systems that are “tolerant of adversarial cyber actions,” as expressed by our interviewee below, seems a herculean task. So I was quite interested to learn […]

One of the issues I have with standards is that they often take on a life of their own – different from what their authors intended – and, eventually become stale checklists that rob energy and innovation from operations and products. So it is refreshing to see how the National Institute of Standards and Technology […]

There are many “free” cybersecurity tools out there but it seems like there are just a handful that actually are having a positive effect on the global security issues of today. To offer two of these impacting tools like Global Cyber Alliance (GCA) is truly noteworthy, and they have the stats to prove their effectiveness. […]

As a former SOC Director, I was always looking for ways to increase the skill levels of my team or get them the education needed for certification while on a strict (i.e., practically no) training budget. Little did I know how easy it could have been if I had met Ralph Sita just a few […]

ICS, SCADA, OT, PIT and even IoT are all acronyms that define a class of systems which manage the flows of data between sensors, actuators and control systems. Over the past decade, the interconnection of these systems with Information Technology (IT) systems and the Internet has been occurring at an ever-increasing pace, creating significant concern […]