Author Archives: Don

About Don

Former VP/GM, Enterprise Application Development in several NASDAQ companies Partner Engagement Manager (Kforce, Inc.); development / deployment of Guest Experience Platform (Carnival Cruise Line) Chief Information Security Officer (CISO) Certification - Carnegie Mellon CIO Institute Certified Information Systems Security Professional (CISSP) Masters, Professional Studies, Georgetown University

Saving Science

  “I believe one of the greatest dangers in modern society is the possible resurgence and expansion of the ideas of thought control; such ideas as Hitler had, and Stalin in his time, or in the Catholic religion in the … Continue reading

Posted in Uncategorized | Leave a comment

Google (Waymo) technology misappropriation claim against Uber

If you are intrigued by technology ‘whodunits’ there is an epic drama unfolding over alleged misappropriation of self-driving vehicle technology. Waymo, the self-driving vehicle unit of Google parent Alphabet, has filed a legal complaint against Uber Technologies for trade secret misappropriation … Continue reading

Posted in Uncategorized | Leave a comment

Ominous Trend in Cyberattacks by Foreign Powers

There has been a dangerous escalation in the impact of cyberattacks over the last several years attributed to foreign state actors and their proxies. Attacks from these actors are termed Advanced Persistent Threats (APTs): highly competent, well funded and organized … Continue reading

Posted in Uncategorized | Leave a comment

Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….

There are known vulnerabilities in mobile phone networks that enable eavesdropping of voice and SMS (text) communications. What has changed:  NIST issued a DRAFT publication that is now explicitly warning of this vulnerability (NIST Pub 800-63B, Sec. Out of Band Verifiers). Also, … Continue reading

Posted in Uncategorized | Leave a comment

Cyber Risk – where to begin for small & mid-size firms

Visiongain estimates that the 2015 worldwide spend on cybersecurity solutions at $75.4B. Gartnerestimates project that spend to exceed $100B in 2018. Despite the continuing investment there is no evidence that a precipitous drop in the number of cyber incidents, nor … Continue reading

Posted in Cyber Risk, Uncategorized | Leave a comment

Economic Implications of CISA and Sovereign Data Privacy

The European Union Data Protection Directive protects how personal information of EU citizens is collected, used, and retained. It prohibits the transfer of personal information to countries outside the EU that do not have similar standards and policies in place. … Continue reading

Posted in Cyber Risk | Leave a comment

The Unintended Consequences of Encryption ‘Backdoors’

For those vested in the integrity of web commerce, there is a must read blog post by Matthew Green, a cryptographer and professor at Johns Hopkins University: If you are too busy, at least read my summary. Juniper Networks recently posted a … Continue reading

Posted in Cyber Risk | Leave a comment

Carefully Consider an Apple Music Subscription before signing-up….

Apple’s development of the iTunes & iPod was brilliantly conceived and executed. It remains a classic example of exploiting technology to effect discontinuities in a consumer market that had remained unchanged for decades. It has been a precipitous fall from … Continue reading

Posted in Uncategorized | Leave a comment

Steps toward machine intelligence…….

Futurists paint a view of an integrated man /machine ‘hybrid’, achieved by instantiating elements of human cognition into computational devices. This essay outlines several important technologies in development and /or early product launch, that form the foundation of this future. … Continue reading

Posted in Machine Intelligence | Leave a comment

Defending against trade secret theft

An excerpt from the Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (Executive Office of the President of the United States, February 2013) states: “foreign competitors of U.S. corporations, some with ties to foreign governments, have increased their … Continue reading

Posted in Uncategorized | Leave a comment