Karen Epper Hoffman, Author at SC Media

Karen Epper Hoffman

Most recent articles by Karen Epper Hoffman

30 years in: My, how SC and security have changed

1989. Acid wash jeans, Bon Jovi and the compassionate conservatism of the Reagan Era were actually, unironically popular. The Berlin Wall fell, free elections were held in the then Soviet Congress of Deputies, Vaclev Havel became president of Czechoslavakia, and pro-democracy rallies held sway in China. And, SC Media was born. It was a time…

True crime: SamSam ransomware I am

It was one for the books – a mysterious cyberattack laying waste to systems in the city of Atlanta before moving on to a wide swath of targets, including health care companies, the Port of San Diego, the Colorado Department of Transportation. March 22, 2018 – Workers arriving in various departments in the city of…

Supply and Demand (for security)

2018 was the year that raised the alarm in earnest about potential vulnerabilities in the supply chain for enterprise computing systems. But with such diverse networks and widespread dependence on third parties, how can organizations expect to plug all potential leaks?  Karen Epper Hoffman reports. It sounds like the stuff of a modern-day John LeCarre novel: The…

Election threats: three things to watch

The system for electing government officials is perhaps more essential to the American way of life than anything else. Hence, the myriad reports of election system compromise has proved offensive on many levels to the American voters. Here is a brief list of potential threats that could affect the forthcoming elections: Nation-state actors. The major…

Election security: the letter of the law

Governments are not just looking to technology, process changes and greater voter education to improve security. The law is playing a role as well. New legislation aimed at providing better security for elections is cropping up in states and counties, and on a federal level. Here is a selection of legislative bills that are related…

A vote for better security

In light of rampant concerns about election tampering and voting machine manipulation, here are some steps IT security experts believe that state and county election officials can (and will) take to mitigate the risk of fraud come Election Day. Sharing information and seeking guidance. Since the 2016 Presidential election, county and state governments have redoubled…

Will privacy be a stumbling block for blockchain?

Best known as the infrastructure underlying the wildly popular Bitcoin cryptocurrency, blockchain technology has really come into its own in the past year or so—being viewed, trialed and utilized as a means of better executing and sharing corporate documents, managing identity and authentication, even running an emerging social media network.

Going Soft: Nation-state attackers seek weaknesses in the system

When nationally backed bad actors from other countries seek areas to infiltrate, they are looking for areas where
they not only can get in, but they can make a big impact. Other than critical infrastructure, nation-states may also try to wheedle their way into financial systems, mobile applications, election technology, and ultimately, IoT devices.

Next post in Network Security