April 10, 2016    /    by

7 Ways to Be More Innovative

You’ve probably heard the phrase “innovate or die.” But not everyone got the memo. So how does innovation really work in practical terms at the office? Regardless of whether you tend to be an innovator or protector, here are seven ways to help your business and career.

credit: Flickr/Boegh


April 3, 2016    /    by

Developing Government Cyber-Leaders

As the government pay gap grows larger with the private sector, where will the next generation of government cybersecurity leadership come from? What's the best background to enable success? Who should consider government cybersecurity roles? The public and private sectors are battling a growing list of global cyberthreats. With more data breaches, cyberattacks targeting critical infrastructure and new Internet of Things vulnerabilities, the competition for competent cybersecurity increases.



March 27, 2016    /    by

Ransomware Emergency: What Can You Do?

The rise in ransomware has taken a dramatic turn for the worse in 2016. Several hospitals recently declared states of emergency. Meanwhile, thousands of global businesses and consumers are now becoming victims of hacking attacks leading to extortion. This very serious situation requires the immediate attention of everyone from PC owners to small businesses to the large governments. Here’s the problem and what actions you must take now to protect yourself.

credit: shutterstock


March 20, 2016    /    by

Hacking March Madness: How Cybercriminals Exploit Popular Sports Events

We’re in mid-March, which means the NCAA College Basketball Tournament is in full swing. But there is more than one way to bust your March Madness bracket, and cybercrooks are also working overtime to grab a piece of the cash. Here’s how (and why) major sporting events are top targets for global hackers.

Credit: Shutterstock/SAJE


March 13, 2016    /    by

Two New Cybersecurity Reports Offer Legislative Opportunities and Data Breach Scenarios

This is a tale of two studies. The first report from the Governing Institute was sponsored by the National Cyber Security Alliance (NCSA) and AT&T, and covers the intriguing results of a state government legislative survey on cyber. The second reports offers a “Data Breach Digest” from Verizon which elaborates on 18 different data breach scenarios worth considering. Both reports are free and bring excellent recommendations and worthwhile opportunities.

Credit: Governing Institute


March 6, 2016    /    by

Security Trends From RSA Conferences

As I flew back to Michigan after another RSA Conference this week, I thought about the highlights, takeaways and major themes in the security industry right now. At the same time, I couldn’t help but look back and reflect on the past several RSA Conferences in San Francisco on a personal level. Bottom line: These RSA Conferences tell quite a bit about where we have been and where are we heading in cyberspace — on both a personal and industry level.

The front of Moscone Center in San Francisco this past week.


February 28, 2016    /    by

The Biggest Trouble with Smartphones

Everybody loves their smartphone, with global adoption soaring and new helpful apps popping up daily. Faster speeds, new models and plenty of competition to lower prices make your mobile device the center of technology innovation. But is there an ‘Achilles Heel’ to watch out for? The answer is yes — and here’s what you can do to help protect yourself.



February 22, 2016    /    by

Book Review: 'Hacked Again'

Scott Schober is small business owner who tells intriguing stories about how his company was hacked — and what happened next. This easy-to-read book is a good primer on the importance of online security for business owners, but it also shows how easily identity theft can happen to anyone, even a cybersecurity expert. Best of all, this book offers practical security advice with helpful steps that we all can follow to secure our corner of cyberspace.

February 13, 2016    /    by

Can 'Hacking Back' Be An Effective Cyber Answer?

With the exponential growth in data breaches over the past few years, the concept of ‘hacking back’ is growing in popularity. Proponents ask: If I can use a gun for self-defense in my home, why can’t I similarly ‘hack back’ against attackers who invade my cyberspace? Let’s examine that premise from different perspectives.

February 7, 2016    /    by

Help! When ‘Things’ Can Send Emails

Does using ‘smart’ devices mean that our inboxes will be even more overflowing with more email? For now, probably.

Credit: Shutterstock/Rudie Strummer