/** **/ The Complex Event Processing Blog | Cyberstrategics

Category: Cyberstrategics

Censorship is Not Cybersecurity

Posted on 06/02/10 No Comments

There was a recent article in the Bangkok Post where a couple of guys I know were basically saying that Thailand needs more “cybersecurity” to control the flow of information in the Kingdom.   They basically said that a new government “cybersecurity organization” needs to be set up to insure that when Thai citizens protest about […]

Read more

Web Cams: The Dark Side of the Net

Posted on 02/25/10 2 Comments

No doubt everyone has read the story where the Lower Merion Township School District remotely enabled webcams on laptops to, in their words, “locate missing laptops”. What on Earth were they thinking? Imagine your daughter has her laptop set up in her room because she did her homework last night. She goes to the shower, […]

Read more

Google v. China: Google Deserves Our Respect

Posted on 01/13/10 3 Comments

In case you have not seen this, David Drummond, Google’s SVP, Corporate Development and Chief Legal Officer has written one of the best blog posts I have even read, A New Approach to China. Google is boldly going where few have ventured to go before, including the US government. China operates as if they can […]

Read more

A US Constitutional Failure Regarding Our Protection

Posted on 01/01/10 No Comments

Like most of you, I am still in complete shock over Northwest Flight 253 and how our government still cannot connect-the-dots in simple intelligence matters to protect us from harm. In this case, the well-respected father of a radical-Islamic Nigerian named Umar Farouk Abdulmutallab reached out to the US Embassy and other organizations in an […]

Read more

Cybersecurity: The Problem with Czars

Posted on 12/23/09 2 Comments

On December 21st, 2009, the White House announced that friend and colleague Howard Schmidt had been appointed to the Executive Office of the President of the United States to serve as the “Cybersecurity Czar” for the Obama administration. I find this personally interesting because a few people (only a few, not many) contacted me earlier […]

Read more

Web 3.0 and the Holy Grail – Universal Language Translation (Part 1)

Posted on 11/27/09 No Comments

Bookstores everywhere in the world are full of dictionaries, language courses and common phrase guides for foreign travel. I don’t have the estimates in front of me, but language translation goods and services – books, electronic gadgets, human translators, interpreters and more, must be a multi-billion dollar global business. Companies like Google are rapidly positioning […]

Read more

Global Warming: It is Not Only the Climate, Stupid!

Posted on 09/27/09 1 Comment

I find it interesting how governments and other organizations are focused on climate change and global warming.   Of course, the threat to our environment is real, there is little doubt about it.  However, did you ever stop to think about “real global warming”? Although climate change is a very critical part of global warming, […]

Read more

U.S. Cyber Command – Air Force Stumbles

Posted on 07/06/09 No Comments

Great and powerful organizations can be handicapped by their own greatness.   The shear magnificence, power and strength of the USAF also can be it’s own weakness at times.  This is certainly true in the area of communications, air power and cyberspace. The communications mission of the Air Force is highly interconnected with it’s core […]

Read more

Only Just Beginning: Twitter message could be cyber criminal at work

Posted on 07/05/09 No Comments

I have blogged (here and on the (ISC)2 blog) about potential security issues in the rising use and hyper marketing of Twitter, so I found this CNN story (which only scratches the surface of the risks) of interest, Twitter message could be cyber criminal at work. “Cyber criminals have been targeting Twitter users by creating […]

Read more

U.S. Cyber Command – Some Deep Background

Posted on 06/25/09 No Comments

It is not common knowledge, but we began discussing the need for a cyber command in the mid-1990s; but it was the Langley Cyber Attack in 1997 that started the momentum toward making a future cyber command a reality.   I don’t want to rehash well-documented historical events in this post.  Instead, I will focus […]

Read more
Page 1 of 41234»