September 16, 2012    /    by

Latest Trends From The Illinois Cyber Security Forum 2012

I had the opportunity to travel to Springfield, Illinois, during this past week to speak at the Illinois Cyber Security Forum. This blog offers some of the highlights, random thoughts and what I lessons learned during the trip.

Illinois Flag

“What’s the best way to become more engaged in this security buzz?” READ MORE

September 9, 2012    /    by

Is a Presidential Executive Order Coming on Cybersecurity?

Over the past few days, numerous news sources reported that President Obama is strongly considering an executive order on cybersecurity. It appears cybersecurity is becoming more political.

Over the past few days, numerous news sources reported that President Obama is strongly considering an executive order on cybersecurity. Here’s a sampling of the news reports:

BloombergBusinessweek: Obama Weighs Executive Order to Defend Against Cyber Attacks READ MORE

September 4, 2012    /    by

Should governments target users with online ads?

I noticed ads showing up all over the place asking me to come back to their websites. Whether I was checking baseball scores at ESPN, doing a Google maps search for driving directions or researching a cybersecurity article at various tech websites, the computer browser was beckoning me to return and buy plane tickets, with targeted ads asking me questions. Will governments be next to use targeted ads online?

    I was surfing the web a few weeks back looking for the best airfare deals from Michigan to various California airports. I checked a variety of travel websites as well as various airport combinations and different days of the week to find the right combination. After more than a week of comparing airfares, airlines and a host of other factors, I finally made my decision and purchased tickets.

 But along the way, I noticed ads showing up all over the place asking me to come back to their websites. Whether I was checking baseball scores at ESPN, doing a Google maps search for driving directions or researching a cybersecurity article at various tech websites, the computer browser was beckoning me to return and buy plane tickets, with targeted ads asking me questions. The advertisements had different colors, shapes and sizes, but they were all trying to get my attention with pointed questions like: READ MORE

August 25, 2012    /    by

Personal Password Protection: How to Strengthen Your Security to Avoid Digital Disaster

One of the hot topics at the MS-ISAC Annual Meeting and GFIRST in Atlanta this week was the recent Wired article by Mat Honan entitled: 'How Apple and Amazon Security Flaws Led to My Epic Hacking.'

One of the hot topics at the MS-ISAC Annual Meeting and GFIRST in Atlanta this week was the recent Wired article by Mat Honan entitled:  How Apple and Amazon Security Flaws Led to My Epic Hacking.

The entire article is worth reading, and may shock you into action. Here is the first paragraph of the article: READ MORE

August 22, 2012    /    by

GFIRST Conference Atlanta 2012

As in previous years, the GFIRST conference in being held during the same week as the MS-ISAC Annual Meeting and the InfraGard annual meetings. This allows a diverse group of experts from around the country to attend multiple events during one trip.

According to the event website, GFIRST is described like this:

“The Government Forum of Incident Response and Security Teams (GFIRST) is a group of technical and tactical practitioners from incident response and security response teams responsible for securing government information technology systems and providing private sector support. GFIRST members work together to understand and handle computer security incidents and to encourage proactive and preventative security practices across government agencies. GFIRST promotes cooperation among the full range of Federal, State and local agencies, including defense, civilian, intelligence, and law enforcement.” READ MORE

August 20, 2012    /    by

MS-ISAC Annual Meeting 2012 in Atlanta

I'm at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days.

   I’m at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days. The MS-ISAC is now a division of the Center for Internet Security (CIS), and this group plays a vital role in cybersecurity information sharing and situational awareness between the Department of Homeland Security (DHS) and state and local governments.

These meetings provide a venue for collaboration and comparing notes amongst the cyber leaders in federal, state and local government.  For the last few years, the meetings have been held in conjunction with the GFIRST conference, which is sponsored by DHS. READ MORE

August 18, 2012    /    by

Is That Wireless Network Legal?

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer Part 2 of this story.

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer “Part 2” of this story.

To summarize my vacation wireless options, I wrote: READ MORE

August 12, 2012    /    by

Cybermania: How do you spell cyber... everything?

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber... whatever.

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber…. whatever.

This brings up an interesting question: How do you spell cyber… anything? While this may seem like a trivial topic, I do think it matters. READ MORE

August 4, 2012    /    by

India Suffers Worst Power Outage in History: What Can We Learn?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. What can we learn from this?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. Six hundred million residents, which is one-tenth of the world’s population, left in the dark in the summer heat for a second day. That was India this past week.

Here’s one news report: READ MORE

July 28, 2012    /    by

Could The Olympics Bring Down Your Network? Here's Some Advice

The 2012 Summer Olympic Games are here, and the five to eight hour time difference between the mainland USA and the UK may be just the right combination to bust your work network(s).

I have some time sensitive information for network and security administrators around the country:

Don’t be lulled to sleep by the lack of network traffic at work from the Olympic Games opening ceremony. READ MORE