top of page
TAPROOT SECURITY®
Cybersecurity Consulting
the NEED TO KNOW blog
you can handle the truth
Search


Rebooting US Cybersecurity After the Shutdown
Smelling blood, American adversaries began circling like sharks during the 35-day partial government shutdown.
Mike McCormick
Feb 18, 20193 min read


Chinese Spy Chip Trumps Tariffs
Chinese cyber exploits are back in the news with a bombshell story claiming China planted tiny “spy chips” inside Made in China servers now in major data centers of Amazon, Apple, and others. Amazon and Apple vigorously deny knowing about spy chips on their servers, even though the story quotes unnamed “senior sources” at both companies. Observers point to this confusion as an example of why reporting on the secretive national security world is challenging. Many security l
Mike McCormick
Oct 9, 20184 min read


Playing the Dark Game
Cyber security is played for high stakes in a world of shadowy threats. Although it’s seldom discussed openly, this dark game can take a...
Mike McCormick
Jun 19, 20183 min read


Did Facebook Break the Law?
You probably know Cambridge researchers got access to 50 million Facebook user profiles, then gave the data to a private political...
Mike McCormick
Mar 19, 20184 min read


When Insiders Profit from Cyber Breaches
One outrageous thing we learned about the Equifax breach (among many) is that three corporate executives sold company stock after the...
Mike McCormick
Mar 6, 20183 min read


After Net Neutrality: A Silver Lining?
Net Neutrality's demise may open the door to overdue cybersecurity improvements. Before you send me hate mail, let me reiterate my...
Mike McCormick
Dec 15, 20173 min read


Who Names Cyber Hurricanes?
Hurricanes get names (Harvey, Irma, Jose, Maria…) assigned alphabetically by the National Oceanic and Atmospheric Service (NOAA). ...
Mike McCormick
Nov 24, 20173 min read


Thunder Sticks and Smartphones
Hackers don’t exploit our computers; they exploit our ignorance. Most of us lack even a basic idea of how our digital gadgets work. ...
Mike McCormick
Jul 25, 20174 min read


A Cancer Moonshot for Cyber Security
The information security profession has long mined biology for metaphors to describe cyber threats. For example, we call certain forms...
Mike McCormick
Mar 2, 20173 min read


America Gets Our First CISO
Last week the White House announced the appointment of Gregory Touhill as the nation’s first Federal Chief Information Security Officer (CISO). Touhill is a retired Air Force general currently serving as acting director of the National Cyber and Communications Integration Center ( NCCIC ). When I toured the NCCIC operations floor, I wasn’t impressed by the walls of monitors or flashing red lights. What impressed me was the people. They seemed to work as a real team in an
Mike McCormick
Sep 14, 20163 min read


Are Russian Hackers Working for Trump?
Conspiracy theories sprout like mushrooms in the fertilized hothouse known as Twitter. Today, in the wake of news reports that Russian hackers stole Trump opposition research from the Democratic National Committee, Twitter is abuzz with speculation that Russia carried out the operation on behalf of Donald Trump. After all, why else would Russia want those files? After all, aren’t Putin and Trump BFFs? By #twitterlogic it must be true. DNC called in CrowdStrike to investi
Mike McCormick
Jun 14, 20163 min read
bottom of page