July 7, 2013    /    by

Will stronger EU penalties deter cybercrime?

Early this week the European Union (EU) mandated national maximum sentences of at least two years in prison for attempting to illegally access information systems. Will these tougher penalties deter cybercrime?

  Early this week the European Union (EU) mandated national maximum sentences of at least two years in prison for attempting to illegally access information systems.

In addition, according to the UK Telegraph, “The maximum penalty for attacks against infrastructure such as power plants, transport or government networks will be set at five years or more, higher than the current tariff in most member states....” READ MORE

June 29, 2013    /    by

Insider Threats Take Center Stage

Are insiders or outsiders the greatest IT threat to enterprise security? Lately, the pendulum seems to be swinging towards the insider threat.

The debate continues: Are insiders or outsiders the greatest IT threat to enterprise security? Lately, the pendulum seems to be swinging towards the insider threat around the globe.

Over the decade, there had been a constant debate amongst security professional regarding this topic. Back in 2008, Bruce Schneier pointed out that outsider attacks are much more frequent, but insider attacks typically cause more damage. The current situation with Edward Snowden seems to support this perspective. READ MORE

June 24, 2013    /    by

An Interview with Teri Takai on FirstNet

Ms. Teresa M. (Teri) Takai, who is the CIO for the United States Department of Defense (DoD), has been an exceptional leader in government for more than a decade. She served as state government CIO in both Michigan and California before joining DoD as CIO in 2010. Ms. Takai was appointed to the FirstNet Board of Directors in August 2012.

Ms. Teri Takai, DoD CIO and FirstNet Board Member Ms. Teresa M. (Teri) Takai, who is the CIO for the United States Department of Defense (DoD), has been an exceptional leader in government for more than a decade. She served as state government CIO in both Michigan and California before joining DoD as CIO in 2010.

I consider it an honor to still know Teri, and it was a privilege to work as CISO under Ms. Takai in Michigan from 2003-2007. READ MORE

June 17, 2013    /    by

Free BYOD Webinar: Keeping Your Data Safe in a Mobile World

There is a free webinar coming up on the topic of BYOD. The online event will be on Tuesday, June 18, at 2 PM (EST).

There is a free webinar coming up on the topic of BYOD, which is being offered by Government Technology Magazine and the Center for Digital Government (CDG). The session is entitled: Keeping Your Data Safe in a Mobile World.

I will be one of several government presenters from around the country.  Lucien Canton, who is a senior fellow for the Center for Digital Government, will be moderating the session. READ MORE

June 16, 2013    /    by

Edward Snowden is No Dietrich Bonhoeffer

Do the ends justify the means in the case of Edward Snowden disclosing classified NSA secrets to the world? I think not.

Do the ends justify the means in the case of Edward Snowden disclosing classified NSA secrets to the world via the UK’s Guardian newspaper? I think not.

Over the past week, worldwide media offered numerous stories covering various aspects of the NSA Prism program, along with differing views regarding how the Top Secret program became public knowledge. There were details about “bigger, bolder data seizures” as well as how a banned USB thumb drive was used to get the information off of classified computer systems by Edward Snowden.  READ MORE

June 9, 2013    /    by

How to decipher NSA data mining: Examine capabilities and intentions

The news media this week was full of articles describing the U.S. government's role in gathering, mining and analyzing big data from nine leading U.S. Internet companies in order to stop terrorism. Where is this capability going?

The news media this week was full of articles describing the U.S. Government’s role in gathering, mining and analyzing big data from nine leading U.S. Internet companies in order to stop terrorism.

The reaction from most of my friends and family has been one of shock, confusion and almost disbelief. One colleague commented, “The whole story seems almost Orwellian.” Several relatives contacted me to get my viewpoint, since I am a former NSA employee.  READ MORE

June 3, 2013    /    by

States' top cyber challenge remains spear phishing

Yes, spear phishing is hot all over the USA - very hot. In fact, this threat may be #1 on the list.

Last fall, one Huffington Post headline read: “White House Hacked In Cyber Attack That Used Spear-Phishing To Crack Unclassified Network.”

 Earlier this year, the Federal Times led with the article: Feds’ chief cyberthreat: spear phishing attacks. They described it this way: “The weapon of choice for most cyber hackers is a malicious email disguised as a friendly email.” READ MORE

May 27, 2013    /    by

Cyberwear Privacy: How Will Google Glasses and Wearable Technology Transform Society?

For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.

For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology – hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.

Coming soon – wearable computers (with cameras) that could be as common as Facebook accounts.   READ MORE

May 21, 2013    /    by

The Best Career Advice I Ever Received

For some reason, there seems to be an abundance of career advice floating around social media web pages right now. What are some of these good career tips, and what is the best career advice I ever received?

 For some reason, there seems to be an abundance of career advice floating around social media web pages right now. I’m not sure why, but perhaps it is because college seniors are looking for their first “real professional” job. Or, perhaps the job market is heating up and more people are interviewing or looking for a new role. Or, maybe there are millions of people just looking for some practical advice or words of
wisdom.

 Regardless of the reason, the google search “career advice” now yields over 436 million page results that are full of tips,  tricks, dos and don’ts for getting ahead or making progress or having a vision for the future. READ MORE

May 11, 2013    /    by

Hackers and Mother's Day: Honoring Hacker-Moms

What do hackers and Mother's Day have in common? According to the wealth of cyberspace knowledge that is defined by Wikipedia, a hacker can mean many things...

According to the wealth of cyberspace knowledge that is defined by Wikipedia, a “hacker” can mean many things:

READ MORE