Exploring the Cybersphere – April 2016

Exploring the Cybersphere – April 2016

This week in our blog, we offer a snapshot of cybersecurity, privacy and data security news of interest to the executive suite. Periodically, we’ll recap insights from the growing cadre of voices in this space as well as lend our own views on the issues that impact...
What the…Hal?

What the…Hal?

“Open the pod bay doors, please, Hal.” “I’m sorry, Dave. I’m afraid I can’t do that.” Well, at least the little psychopath was well mannered. The world was introduced to Hal (acronym for Heuristically programmed ALgorithmic...
The Elephant in the Room

The Elephant in the Room

Ever wonder about the origin of the phrase “the elephant in the room?”  Did the phrase originate with Russian author Ivan Andreevich Krylov, whose “The Inquisitive Man” tells of a man who goes to a museum and notices all sorts of tiny things, but fails to...
Heads in the Sand Over Cybersecurity?

Heads in the Sand Over Cybersecurity?

The ostrich defense is a criminal defendant’s claim of being ignorant of the criminal activities of an associate, which normally the defendant would be expected to be aware of. The defendants seeking this defense claim that all wrongdoing was performed by...