top of page

News

 

Following is a list of articles written by Larry Karisny, Director of ProjectSafety. These articles were written over five years showing both the problems and solutions in achieving true cybersecurity.  These articles have been highly acclaimed by industry professionals within the 'cybersecurity community. Many article discussion points to predictions that were later validated through continued research, group discussions and industry recommendations.  You can follow these articles in Government Technology Magazine  or on Linkedin.

SEP 30, 2020

True Random Entropy is Getting Real

With cyber criminals netting a staggering 1.5 trillion dollars a year, the size of the cybercrime industry is now exceeding the size of major tech companies and even being larger than Walmart.

MAY 8, 2018

Are We Looking at Our Last Chance to Get IoT Security Right?

The Internet of Things is growing and so is the risk of exploitation

JANUARY 16, 2018

IoT Is Changing the Cybersecurity Industry

Despite a less-than-stellar record to this point, the Internet of Things space is forcing companies to think holistically about the security behind their devices.

October 6, 2017

Is Cybersecurity Encryption Ready to Break?

Cyberattacks are already bad today. But what if all encryption didn’t work? We are reaching a point now where global adversaries can crack encryption, and will be able to crack all encryption in the near future.

August 8, 2017

The Race to Cyberdefense, Artificial Intelligence and the Quantum Computer

The power grid, oil and gas, and even existing telecoms are perfect targets for funding and development of these technologies.

 

March 30, 2017

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity. So what is this industry doing wrong, and how can we change it?

February 15, 2017

Why IoT Will Force New Cybersecurity Technologies

Danger: Conventional cyberdefense technologies not capable of securing the Internet of Things.

 

March 2, 2016

Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element

Cybersecurity expert Chuck Brooks talks about where we stand in what many people call the "wild, wild west" of cybersecurity.

 

February 14, 2016

Bringing Innovation into Cyberdefense Technologies

Hackers use innovative thinking when breaching systems, why can't government?

 

January 13, 2016

Cybersecurity 2016: Out with the Old, in with the New

The costs of cyberattacks have significantly affected corporate bottom lines, and nation-state attacks have threatened the security of entire countries, renewing the focus on and demand for cyberdefense.

 

November 12, 2015

Cybersecurity:  A millisecond defense.

From access to activation, we pass through multiple digital ecosystems with devices that can be used to hack unrelated digital system processes in a millisecond.

 

October 14, 2015

We need a cybersecurity approach that is proactive, agile and adaptive.

Before delivering a keynote at the Florida Center for Cybersecurity 2015 Annual Conference, former NSA Director Keith Alexander spoke about his new startup and the direction cybersecurity must take to be successful.

 

August 14, 2015

Cybersecurity:  Fix it or die?

From unlocking and opening garages to hacking a satellite, recent breach demonstrations made a clear point about cyberattacks: They are very real and can be very dangerous. And our current method of "fighting" these attacks is not working.

 

July 2, 2015

Even Einstein couldn't fix cybersecurity.

The Einstein and Continuous Diagnostics and Mitigation cybersecurity programs have been hailed as the cornerstone of repelling cyberthreats in real-time -- but it turns out this is not actually the case..

 

April, 15, 2015

Cybersecurity:  When "good enough' isn't enough

If superior cybersecurity technologies exist, there is a responsibility beyond corporate profits or government compliance standards that must expedite their use.

 

March 4, 2015

Cybersecurity:  Taking a proactive approach is key

If we are to proactively defend our cybersecurity, we must move away from historical algorithm audit and analysis to real-time pattern recognition audit and analysis.

 

January 21, 2015

Will DPM 5GL Save Cybersecurity?

The back and forth hack and patch cyberwar could be devastating. Is Digital Process Management 5th Generation Programming Language the answer?

 

December 8, 2014

Securing the Intellectual Property of Cybersecurity

In this Q&A, a security expert discusses the problems and approaches in fixing cybersecurity.

 

November 7, 2014

DARPA Director Calls for Cybersecurity Change

Real-time cybersecurity is now a necessity, and has reached the point of requiring big changes in how we are going to fix cybersecurity today.

 

September 15, 2014

Getting Cybersecurity to Actually Work

Today, all cybersecurity technologies secure information processes at points that are too late to achieve true cybersecurity -- and hackers know this.

 

April 2, 2014

Is Cybersecurity Officially Broken?

The old model of "good enough security" is being replaced by a new model of "0 trust security" -- the new platform on which cybersecurity must be built.

 

January 23, 2014

Time for a Cybersecurity Overhaul

The penetrate-and-patch cybersecurity market is a short-term solution and actually demonstrates how weak current security methodologies are.

 

October 16, 2013

Is Cybersecurity an Inside Job?

Security is only the anomaly detection of an incorrect process action.

 

August 8, 2013

Are Black Hats and White Hats Really Grey Hats?

Frankly, the exploit offense technologies are currently beating the security prevention and detection defense technologies every which way.

 

June 19, 2013

Column: Cyber Attacks the Reality, the Reason and the Resolution Part 3

There is no "it won’t happen to me" anymore.

 

June 7, 2013

Column: Cyber Attacks -- the Reality, the Reason and the Resolution. Part 2

If we have cybersecurity protection, then why are hackers hacking? Because they can.

 

May 24, 2013

Column: Cyber Attacks -- the Reality, the Reason and the Resolution. Part 1

New evidence of startling increases in the volume and scale of cyberattacks suggests that current security technologies may have reached their limits.

 

April 22, 2013

Column: Google Cybersecurity, Hack or Help?

Google’s recent network, acquisitions and hires in Austin, Texas, have created an opportunity to do security right the first time.

 

March 4, 2013

Cyber Espionage, More Than Just China

One expert applauds that information security company Mandiant released its research, looking at it as a wake-up call.

 

January 9, 2013

Common Sense Cybersecurity

"We lose control of our grid, that's far worse than a botnet taking over my home PC."

 

January 2, 2013

A New Way of Detecting Cybersecurity Attacks

Networking and software pioneer Rajeev Bhargava discusses his unique way seeing and correcting our recent surge of cyberbreaches.

 

December 27, 2012

Cybersecurity in Today's World

According to security expert Curt Massey, standards, certifications and compliance force industry and government to keep an inherently insecure system insecure.

 

December 19, 2012

Cybersecurity and 'Smart Encryption'

The $388 billion cybercrime business is now as large as the international illegal drug trade, and brings threats of foreign espionage.

 

November 5, 2012

Industrial Control System Security: a Reliability Issue?

"One would hope that after all of the power issues with Hurricane Sandy, utility executives will take ICS cyber security more seriously before it is too late."

 

September 20, 2012

Anomaly Detection: Front-Door Infrastructure Security

What if we could create an anomaly algorithm that could audit, detect and approve positive input events in business processes?

 

August 6, 2012

Grid Security Summit Assembles Top Security Experts

Security needs to change to protect utilities and the grid.

 

May 31, 2012

Flame Virus, a Controlled Burn?

We can’t continue to patch cyber security while thinking we can manipulate these vulnerabilities in targeted cyber attacks.

 

May 14, 2012

Smart Grid Security: An Inside View from Patrick C. Miller

"We are ultimately seeking a modernized power system that is somewhat self-aware, self-healing and self-managed."

 

April 18, 2012

Smart Grid Security, Challenges and Change

With immediate security needs evident, there must be a way out of what people in the security business are now calling the "smart grid security circus."

 

January 4, 2012

Smart-Grid Security Will Force New Ways of Thinking

We can no longer look security solutions of the past when trying to secure the enormous amount of data that will flow through the smart grid. Old methods are too complex and too slow.

 

October 26, 2011

The Stuxnet 2, Coming to a SCADA System Near You!

IPS can eliminate man-in-the-middle spoofing/sniffing risks or denial-of-service vulnerabilities.

 

August 25, 2011

Securing the Intellectual Property of Smart Grid Security

"The clearest example of vulnerability brought on by computer controls happens to be the one system that everything else depends upon: the electric power grid."

 

August 4, 2011

Cyber Wars Start, is the Power Grid Next?

"The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems our governmental systems."

 

May 12, 2011

Smart-Grid Security, A Trillion-Dollar Boom or Bust

In spite of power-grid security breaches, just stopping the smart grid isn't an answer or even an option.

 

March 16, 2011

Japanese Earthquake and Tsunami, Spread and Secure the Grid

Loss of power though natural or man-made causes can range from an inconvenience to a global catastrophe.

 

February 8, 2011

Taking the Temperature of the Smart Grid

Sandra Manning, utility marketing manager, City of Tallahassee, demonstrated a running smart-grid application.

 

January 24, 2011

Smart Grid Security: Generally Speaking, the World Doesn't End

Remote control functionality always opens additional pathways for attackers.

 

December 8, 2010

Who Owns Smart-Grid Security?

If Stuxnet is any indication, then the serious attackers are way ahead of us and can pretty much operate with impunity.

 

November 18, 2010

Will Security Start or Stop the Smart Grid?

Stuxnet brings years of warnings from theory to reality.

 

September 10, 2010

GridNet: A look under the Smart Grid Hood

"Our goal is to become the leading provider of universal smart-grid operating systems for any device and any broadband technology."

 

August 26, 2010

Securing the "Internet of Things"

There are actually ways to offer high-end security with low overhead through layer 2 security techniques.

 

August 17, 2010

Smart Grid Security: No Hype Allowed

"What I found most interesting is the assertion by some vendors that the meters have security features built in that utilities often choose not to implement for their own reasons."

 

July 19, 2010

Who Will Build the Smart Grid?

Rock Hill incorporated wireless broadband as part of a strategy to build a multi-use communications foundation.

 

June 2, 2010

Smart Grid Security, Ground Zero for Cyber Security

"One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet." -- Vint Cerf

 

May 27, 2010

The Smart Grid Needs to Get Smart About Security

So now with little knowledge of the Internet and security the power companies have billions of dollars of grants in hand with one big problem. The grants mandate an iron-clad security platform.

News

 

 

 

 

 

 

 

bottom of page