June 13, 2015 /
We are continuing the series of interviews with top CIOs and CISOs from around the nation regarding the best state and local government cybersecurity strategies. This week, we turn toward the Buckeye State to learn from two respected executive leaders. At a time when the federal government is reeling from a major OPM data breach, this security discussion has never been more important.
June 6, 2015 /
Alan B. Trabue worked for the CIA for over 38 years, and he has hundreds of true stories to tell about domestic and foreign agents and lies and spies. He has just published an amazing book that tells about his career as a covert operations polygraph interrogator with exciting travels all over the world. For anyone who is interested in polygraph exams or for those who are intrigued by the complexities of intelligence operations around the world, you must read this book. Here is a brief book preview and an interview with the author of 'A Life of Lies and Spies.'
May 30, 2015 /
Will Pelgrin started the MS-ISAC more than a decade ago, and he is a leading voice in government cyberdefense. Tomorrow is his last day with the Center for Internet Security, and I caught up with him and new CEO Jane Lute to discuss the past, the present and the future of global cybersecurity -- especially within governments.
May 25, 2015 /
Everyone is talking about smart cities. And yet, new public- and private-sector questions are emerging as more organizations engage with this global technology megatrend. So how can you take these opportunities to the next level? Who are the leaders within this hot Internet of Things (IoT) category? Which academic studies and white papers offer best practices and the most helpful resources to take your region to the next level? What cyber-risks are emerging? Here are answers and resources to consider.
May 18, 2015 /
Industry experts disagree on whether the Islamic State’s ability to mount a dangerous cyberattack is a top concern or an emerging online threat or completely overblown. But one thing is not in doubt, ISIS is making news headlines in 2015 for their exploits in cyberspace. In my view, ISIS is an emerging online threat to keep a close watch on. Here’s why.
May 11, 2015 /
The latest bills, privacy concerns and information-sharing actions.
May 3, 2015 /
I traveled to the United Arab Emirates (UAE) this past week to present the opening keynote at the Gulf Information Security Expo & Conference (GISEC 2015) in Dubai. The event offered a refreshing mix of leading global voices on security and technology topics. But most surprising, the Gulf region's public and private sector executive leaders who presented, the companies exhibiting and the amazing city as a whole offered attendees a different perspective and a positive model for the current cybersecurity and technology infrastructure challenges in the Middle East and the world as a whole.
April 24, 2015 /
Attendance records were probably broken, and there were numerous very good sessions. Still, surprisingly, government announcements may have been the highlight of the week.
April 19, 2015 /
We are continuing the series of interviews with leading state government CIOs and CISOs from around the nation. This week, we turn to Washington state and its security priorities and technology plans.
April 11, 2015 /
A new report released this week by Trend Micro and the Organization of American States (OAS) shows a dramatic increase in cyberattacks directed against critical infrastructure owners and operators.