June 9, 2013    /    by

How to decipher NSA data mining: Examine capabilities and intentions

The news media this week was full of articles describing the U.S. government's role in gathering, mining and analyzing big data from nine leading U.S. Internet companies in order to stop terrorism. Where is this capability going?

June 3, 2013    /    by

States' top cyber challenge remains spear phishing

Yes, spear phishing is hot all over the USA - very hot. In fact, this threat may be #1 on the list.

May 27, 2013    /    by

Cyberwear Privacy: How Will Google Glasses and Wearable Technology Transform Society?

For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.

May 21, 2013    /    by

The Best Career Advice I Ever Received

For some reason, there seems to be an abundance of career advice floating around social media web pages right now. What are some of these good career tips, and what is the best career advice I ever received?

May 11, 2013    /    by

Hackers and Mother's Day: Honoring Hacker-Moms

What do hackers and Mother's Day have in common? According to the wealth of cyberspace knowledge that is defined by Wikipedia, a hacker can mean many things...

May 4, 2013    /    by

OpUSA: A Promise of Cyber Events to Come?

What will actually happen in (or to) cyberspace on May 7, 2013? Is this the new normal in cyber threats?

April 27, 2013    /    by

Fake Tweet? Dealing with the AP Twitter feed hack

There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday. Bottom line, each of us still needs to decide: Can I trust that tweet?

April 21, 2013    /    by

After Boston: Relief, Thanks, Questions and Early Lessons

After the unprecedented events of that took place in and around Boston last week, where are we now and where are we going?

April 16, 2013    /    by

BYOD for You: New Guidebook for Employees to Bring Your Own Device

I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD).

April 7, 2013    /    by

What if George Washington's rules of decency were adapted for social media?

Recently, my family was discussing lesser known facts about our first President, George Washington. The intriguing conversation centered on George Washingtons 110 Rules of Civility & Decent Behavior in Company and Conversation. How can we apply these rules to online decency today?