May 21, 2013    /    by

The Best Career Advice I Ever Received

For some reason, there seems to be an abundance of career advice floating around social media web pages right now. What are some of these good career tips, and what is the best career advice I ever received?

 For some reason, there seems to be an abundance of career advice floating around social media web pages right now. I’m not sure why, but perhaps it is because college seniors are looking for their first “real professional” job. Or, perhaps the job market is heating up and more people are interviewing or looking for a new role. Or, maybe there are millions of people just looking for some practical advice or words of
wisdom.

 Regardless of the reason, the google search “career advice” now yields over 436 million page results that are full of tips,  tricks, dos and don’ts for getting ahead or making progress or having a vision for the future. READ MORE

May 11, 2013    /    by

Hackers and Mother's Day: Honoring Hacker-Moms

What do hackers and Mother's Day have in common? According to the wealth of cyberspace knowledge that is defined by Wikipedia, a hacker can mean many things...

According to the wealth of cyberspace knowledge that is defined by Wikipedia, a “hacker” can mean many things:

READ MORE

May 4, 2013    /    by

OpUSA: A Promise of Cyber Events to Come?

What will actually happen in (or to) cyberspace on May 7, 2013? Is this the new normal in cyber threats?

What will actually happen in (or to) cyberspace on May 7, 2013?

That is the question that many are asking as they prepare for a promised attack from the hacktivist groups this coming week. According to an announcement in an April 24 Pastebin threat to US and Israeli Governments, “We gonna launch a big attack against The USA Network and we gonna make some Damages.” READ MORE

April 27, 2013    /    by

Fake Tweet? Dealing with the AP Twitter feed hack

There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday. Bottom line, each of us still needs to decide: Can I trust that tweet?

There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday.

After the verified AP Twitter feed was hacked, a message was sent out that read, “Breaking: Two explosions in the White House and Barrack Obama is injured.”   READ MORE

April 21, 2013    /    by

After Boston: Relief, Thanks, Questions and Early Lessons

After the unprecedented events of that took place in and around Boston last week, where are we now and where are we going?

After the unprecedented events that took place in and around Boston last week, where are we now and where are we going?

As an American living in Michigan who closely watched the events unfolding from Monday through Saturday, my thoughts and emotions are mixed. READ MORE

April 16, 2013    /    by

BYOD for You: New Guidebook for Employees to Bring Your Own Device

I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD).

BYOD for You Book Cover I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD). As described yesterday by Sarah Rich in this piece called BYOD Recommendations and Dilemmas, the focus of the book is to provide a guide for employees who use their own smartphone, tablet or other mobile device for both personal and professional tasks.

  The new eBook is called BYOD for You: The Guide to Bring Your Own Device to Work. The specific details on the eBook, as well the introduction, can be found at the “BYOD for You” book website: www.byod4u.com or Facebook.com/byod4u. READ MORE

April 7, 2013    /    by

What if George Washington's rules of decency were adapted for social media?

Recently, my family was discussing lesser known facts about our first President, George Washington. The intriguing conversation centered on George Washingtons 110 Rules of Civility & Decent Behavior in Company and Conversation. How can we apply these rules to online decency today?

Recently, my family was discussing lesser known facts about our first President, George Washington.  The intriguing conversation centered on George Washington’s 110 Rules of Civility & Decent Behavior in Company and Conversation.

If you’re not familiar with this important corner of history, here’s a brief excerpt from the introduction to George Washington’s rules, drawn from Foundations Magazine online: READ MORE

March 31, 2013    /    by

Futurists: In-body computers and higher-stakes for security

What are futurists predicting regarding technology? And for security, what is coming down the road?

The book 1984 was written by George Orwell in the 1940s. Words and concepts such as; “Big Brother, doublethink, thoughtcrime, Newspeak and even Orwellian” come from this famous literary work.  

More than sixty years later, philosophers still argue about what Orwell would say about the Internet, technology in 2013 or our future, if Orwell were alive today. Students continue to read and learn from Orwell and debate questions about security, privacy and monitoring on the Internet today. READ MORE

March 24, 2013    /    by

Why trashing security awareness training is a bad idea

There has been a lot of discussion over the past few months regarding an article entitled: Why you shouldn't train employees for security awareness. Here's my response.

There has been a lot of discussion over the past few months regarding an article entitled: Why you shouldn’t train employees for security awareness.  This viral article from last summer is still very popular. It was written by Mr. Dave Aitel, who is the founder and CEO of Immunity. If you’re not familiar with this debate on the value of cyber awareness training, I recommend taking ten minutes to check out Mr. Aitel’s views and the corresponding comments.

After reading this article as well as many rebuttals, I believe a few common themes emerge: READ MORE

March 17, 2013    /    by

New NIST Cybersecurity Framework: Your Input Needed

The National Institute of Standards and Technology (NIST) issued a press release recently announcing the development of a new framework to reduce cyber risk. What do they need right now? Your input.

The day after President Obama released the “Improving Critical Infrastructure Cybersecurity Executive Order,” the National Institute of Standards and Technology (NIST) issued this press release announcing the development of a new framework to reduce cyber risk.

What do they need right now? Your input by April 8. READ MORE