What advice would you provide to a women thinking about a career in cybersecurity & technology? Always have an open mind, understanding that there is no magic to success, just passion, determination, and perseverance when everyone simply wants to call it quits. Never stop learning and stay connected with others. Have the confidence in yourself and… Read More »
Conversations With Cybersecurity’s Undervalued Workforce – Introduction
Conversations With Cybersecurity’s Undervalued Workforce – Introduction by Magda Lilia Chelly and Scott Schober Scott: The cybersecurity industry is in dire need of information security professionals to combat growing global cyber threats. There is a clear shortage, especially in the lack of women entering the cyber workforce. I am a proud father of two. My… Read More »
Hoarding Vulnerabilities Makes Me ‘WannaCry’
Hoarding is when an individual has difficulty parting with or discarding possessions regardless of their value. But most hoarders eventually have their day of reckoning when their world implodes and their behavior affects not just themselves, but family and friends. Hoarding security vulnerabilities has similar parallels but on a scale affecting potentially billions of innocent users. In a… Read More »
The Easiest Way To Prevent Your Email or Facebook Being Hacked
The Easiest Way To Prevent Your Email or Facebook Being Hacked My screen popped up with a message from a friend. “Help!” it said. “I’m on vacation and I lost my wallet and I’m stuck! Can you wire me $2,000?” I sent a text to my friend to verify this, and it turned out he… Read More »
Facebook Buying Stolen Passwords To Fight Hackers
With close to 1.2 billion users, 5 new profiles created every second and average users spending 20 minutes on Facebook alone, it would seem that Facebook would eventually outgrow the number of available of passwords. That assumption couldn’t be further from the truth. What is troubling to cybersecurity experts like myself is that while even 8 character passwords… Read More »
There’s Only 1 Way To Secure Trump’s Phone
There’s Only 1 Way To Secure Trump’s Phone Smartphone security is a fairly binary process these days. Whether you’re sporting an iPhone, Android or even Blackberry or Windows smartphone, any security expert will tell you that none are 100% secure. This might not be an issue for most of us but what about the leader of the… Read More »
The future of cybersecurity: Experts make 2017 predictions
With 2017 fast approaching we’re seeing many predictions lists, including cybersecurity predictions. I had the privilege of getting a firsthand look at predictions from leading cybersecurity experts. One of the most striking ones in my opinion came from Tyler Carbone, COO at Terbium Labs when he declared that the security versus convenience debate will enter… Read More »
World Of Watson Makes For A Better World
I recently had a chance to interview two experts in their respective fields of cybersecurity, Morgan Wright, an internationally recognized expert on cybersecurity strategy and cyberterrorism enforcement and Shahid Shah, an internationally recognized and influential cybersecurity and risk management expert. Besides both sharing a passion for cybersecurity and its applications in law enforcement, they were also both looking forward… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 12
- Next Page »