Focus cyber risk on critical infrastructure:  Remote substations are vulnerable
Opinion

Focus cyber risk on critical infrastructure: Remote substations are vulnerable

Doug DePeppe has some especially strong feelings about protecting remote substations from cyber attacks. Here is his guest CSO blog to explain why.

03/25/14

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming
Opinion

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

02/02/14

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming
Opinion

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

02/02/14

No More XP: CSOs Need to Engage Now
Opinion

No More XP: CSOs Need to Engage Now

Migrating off of Windows XP has become an issue that has jumped to the top of the CIO priority lists all over the world. Is your enterprise ready? Are you engaged with the plan?

12/14/13

Opinion

Watch the Michigan Cyber Summit Online

The 2013 Michigan Cyber Summit will be held on Friday, October 25, 2013. The agenda is packed with experts from all over the world, and the opening keynote will be delivered by Michigan Governor Rick Snyder. Governor Snyder is the...

10/24/13

Could Syria launch a major cyberattack against the USA?
Opinion

Could Syria launch a major cyberattack against the USA?

Should our leaders consider whether pro-Syrian forces might launch a cyberattack against US critical infrastructure in retaliation for military action? My view: American businesses should hope for the best, while preparing for the...

09/02/13

Two New Insider Threats to Consider
Opinion

Two New Insider Threats to Consider

Recent headlines have highlighted what I believe are two new threats that have traditionally received minimal attention. These new insider threats include a new employee profile to consider and a series of disruptive technologies....

06/23/13

Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone
Opinion

Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone

I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work.

04/16/13

Opinion

BYOD is the New WiFi - Here’s Why

About a decade ago, the implementation of wireless networks was a very hot, even cutting edge, issue in computer security circles. The widespread mantra for CISOs at that time was: “WiFi is a bad idea.” In my view, BYOD is the new...

04/13/13

Google Chrome issues warnings while blocking ESPN.com and major websites
Opinion

Google Chrome issues warnings while blocking ESPN.com and major websites

On Saturday, February 9, 2013, I was watching Valparaiso play Cleveland State in college basketball while checking on some sports scores. All of a sudden, a red box popped up from my Google Chrome browser which cut off the website and

02/10/13

Opinion

The Michigan Cyber Range – Who, What, When, Where and How

What is a cyber range? Who needs a cyber range? Where can you go to learn more or to get your technology and security teams some of this advanced training?

11/15/12

Opinion

CISO 2020: Will you be ready?

What are the key traits that CSOs and CISOs need to manifest in order to survive in our ever-changing, even hostile, cyber world? Last Friday evening, I had the honor and privilege of offering the opening keynote speech for CISOs, as...

11/01/12

Opinion

Marketing security: True stories strengthen numbers for making point

How do security pros typically make the case for more, better or stronger security? Answer: Numbers - big numbers! I recommend adding a few stories.

09/08/12

Opinion

The Time is Right for The International Cybersecurity Dialogue

Ever since I became Michigan’s first Chief Information Security Officer (CISO) in 2002, I have noticed a disturbing gap between front line users, security technologists and many senior policy makers. What can I suggest in the way of a

07/02/12

Opinion

Titanic Mistakes: Five Pragmatic Lessons from Spectacular Technology Failures

Everyone is talking about the sinking of the Titanic – and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...

04/14/12

Opinion

Stuck in CAPTCHA Hell: When Security Disables

A CAPTCHA popped up questioning my credentials. “Darn, I hate when this happens,” I thought. “No worries, I’ve been through this security checkpoint before.” I typed in the two different words with the fuzzy characters. “Is there a...

03/03/12

Opinion

Real Government Cloud Computing Efforts

What’s really going on with cloud computing in government? That’s been the key question for both public and private sector technology and security leaders over the past few years. Other perplexing issues include: Are the savings real?

02/25/12

Opinion

Privacy, Piracy and Parental Controls: Where In the World Are We Going in 2012 And Beyond?

It’s that time of year when we look back to reminisce on the past and look forward and attempt to predict what’s coming next. What’s the prize? If you can figure out this maze correctly, you can pretty much predict the future of the...

01/05/12

Opinion

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 3 - Wrap-up)

We are discussing technology’s role in reducing the insider threats using a SIEM solution. In the previous installments of this blog series we have established the need for a SIEM solution and determined roles needed to implement this

12/29/11

Opinion

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 2)

This article is about roles and they are as important in government IT as they are in the NBA. The roles and responsibilities required for successful SIEM implementation and the importance of establishing clearly defined roles cannot...

12/09/11

Load More