GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The United States Intelligence Community, or IC, is a federation of 16 separate U.S. intelligence agencies, plus a 17th administrative office. The IC gathers, stores and processes large amounts of data, from a variety of sources,  in order to prov… Continue reading GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

The healthcare industry has poured vast resources into cybersecurity since 2015, when a surge of major breaches began.  While the nature of these breaches has evolved over the last four years, the growth in total healthcare incidents has unfortuna… Continue reading GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

I have a Yahoo email account, I’ve shopped at Home Depot and Target, my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management, I’ve had insurance… Continue reading MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. But smart homes, smart workplaces and smart shopping malls are just the warm-up act. Get ready for smart ground transportation. R… Continue reading MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by p… Continue reading MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

The vast majority of cyber attacks against organizations pivot off the weakest security link: employees.  The good news is that companies today have ready access to a wide variety of tools that can simulate common types of attacks and boost employ… Continue reading GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. However, after a recent visit to Detroit, Ann Arbor and Grand Rapids as a guest of the Michigan Economic Development Corp., or MEDC, I’m pr… Continue reading MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

Privacy regulations and legislation are topics that continue to be of concern for consumers and businesses alike.  News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small … Continue reading GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. A  string of advances in biometric authentication systems has brought facial recognition systems, in particul… Continue reading GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

Even as enterprises across the globe hustle to get their Internet of Things business models up and running, there is a sense of  foreboding about a rising wave of IoT-related security exposures. And, in fact, IoT-related security incidents have al… Continue reading New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps