MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. But smart homes, smart workplaces and smart shopping malls are just the warm-up act. Get ready for smart ground transportation. R… Continue reading MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by p… Continue reading MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

The vast majority of cyber attacks against organizations pivot off the weakest security link: employees.  The good news is that companies today have ready access to a wide variety of tools that can simulate common types of attacks and boost employ… Continue reading GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. However, after a recent visit to Detroit, Ann Arbor and Grand Rapids as a guest of the Michigan Economic Development Corp., or MEDC, I’m pr… Continue reading MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

Privacy regulations and legislation are topics that continue to be of concern for consumers and businesses alike.  News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small … Continue reading GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. A  string of advances in biometric authentication systems has brought facial recognition systems, in particul… Continue reading GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

Even as enterprises across the globe hustle to get their Internet of Things business models up and running, there is a sense of  foreboding about a rising wave of IoT-related security exposures. And, in fact, IoT-related security incidents have al… Continue reading New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

Cyber criminals are deploying the very latest in automated weaponry, namely botnets, to financially plunder corporate networks. The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps… Continue reading NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

A security-first mindset is beginning to seep into the ground floor of the IT departments of small and mid-sized companies across the land. Senior executives at these SMBs are finally acknowledging that a check-box approach to security isn’t enou… Continue reading Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

GUEST ESSAY: Did you know these 5 types of digital services are getting rich off your private data?

Now more than ever before, “big data” is a term that is widely used by businesses and consumers alike.  Consumers have begun to better understand how their data is being used, but many fail to realize the hidden privacy pitfalls in eve… Continue reading GUEST ESSAY: Did you know these 5 types of digital services are getting rich off your private data?