MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security re… Continue reading MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

A report co-sponsored by Lloyd’s of London paints a chilling scenario for how a worldwide cyberattack could trigger economic losses of some $200 billion for companies and government agencies ill-equipped to deflect a very plausible ransomware att… Continue reading MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

Would you back out of a driveway without first buckling up, checking the rear view mirror and glancing behind to double check that the way is clear? Consider that most of us spend more time navigating the Internet on our laptops and smartphones than we… Continue reading MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

MY TAKE: US cyber adversaries take cue from shutdown to accelerate malware deployment

One profound consequence of Donald Trump’s shutdown of the federal government, now in day 33, is what a boon it is to US cyber adversaries. And moving forward, the long run ramifications are likely to be dire, indeed. Related: Welcome to the &#82… Continue reading MY TAKE: US cyber adversaries take cue from shutdown to accelerate malware deployment

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

I have a Yahoo email account, I’ve shopped at Home Depot and Target, my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management, I’ve had insurance… Continue reading MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. But smart homes, smart workplaces and smart shopping malls are just the warm-up act. Get ready for smart ground transportation. R… Continue reading MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by p… Continue reading MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. However, after a recent visit to Detroit, Ann Arbor and Grand Rapids as a guest of the Michigan Economic Development Corp., or MEDC, I’m pr… Continue reading MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Related: Why a ‘zero-trust’ approach to security is necessary On… Continue reading NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

“May you live in interesting times.” The old Chinese proverb–some consider it a blessing and others a curse–certainly describes the modern-day cyber landscape. Related: 7 attacks that put us at the brink of cyber war In today&#8… Continue reading MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun