I recently had a chance to interview two experts in their respective fields of cybersecurity, Morgan Wright, an internationally recognized expert on cybersecurity strategy and cyberterrorism enforcement and Shahid Shah, an internationally recognized and influential cybersecurity and risk management expert. Besides both sharing a passion for cybersecurity and its applications in law enforcement, they were also both looking forward… Read More »
Is Hacktivist Disruption Enough For Change?
I recently attended an exclusive roundtable discussion with The Verge for a event hosted by Story, a retail concept store with ever changing themes located in midtown Manhattan. Story re-invents itself about every two months and this time around it’s all about hacking including an interactive exhibit hosted by USA Network’s hit TV show Mr. Robot. The exhibit includes everything from vintage Atari arcade… Read More »
Is the Internet of Things a scary proposition for organizations?
The Internet of Things (IoT) is poised to be the ultimate technology disrupter. Companies are racing to build out Internet of Things businesses, but security is not at the top of the list. When security is considered low priority within any organization, the hairs on the back of my neck stand up. And security is… Read More »
Cybersecurity and the future of smart cars
A few years ago my car was stolen. It was a truly horrific event that still makes me triple-check that all the doors are locked and the alarm is set each time I park. I’ve also experienced having my credit card compromised, my website and Twitter accounts breached, and my checking account hacked, resulting in… Read More »
Is a serial hacker stalking Rutgers University?
Since spring of 2014, Rutgers has been targeted by a hacker or group of hackers in a series of distributed denial of service (DDoS) attacks. A DDoS attack uses a network of compromised computers called a botnet to access the targeted site simultaneously. The increase in traffic overwhelms the targeted network and causes it to… Read More »
Is Drone Skyjacking The New Hijacking?
Right now most civilian drones are owned by hobbyists for recreational use, but many companies are exploring commercial uses. Drones have already been used for shooting nature documentaries and commercials, aerial surveys on remote properties, checking on crops for farmers and even delivering pizza. They have the potential to revolutionize many aspects of our daily… Read More »
LastPass Hacked And Why I Have Never Used It
I have always felt the concept of LastPass as well as other password managers makes sense for users that would otherwise create simple ‘easy to remember’ passwords as opposed to long strong complex passwords with a password manager. Surely, having numerous passwords in the cloud encrypted is better than jotted down on a sticky note that… Read More »
Can The FBI Attract Ethical Hackers?
In today’s online world, cyber attacks can be nearly as devastating as traditional warfare. In addition to cyber terrorism, hackers have stolen identification and credit card information from millions of Americans in cyber attacks on large businesses. Local law enforcement often doesn’t have the skills or manpower to handle these cyber crimes, and jurisdiction becomes… Read More »