3 security career lessons from 'Back to the Future'

3 security career lessons from 'Back to the Future'

You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.

Secrets of industry-hopping CSOs

Secrets of industry-hopping CSOs

Who says you can't change industries? Veteran security leaders Mark Weatherford and Cheri McGuire teach you how it’s done.

Why security pros are addicted to FUD and what you can do about it

Why security pros are addicted to FUD and what you can do about it

Despite professing anti-FUD rhetoric, cyber experts fan the flames, breathlessly sharing the details of the latest data breaches. It's a risky addiction that can lead to security apathy in enterprises. Here's how to harness it.

Bridging the smart cities security divide

Bridging the smart cities security divide

There are plenty of organizations that seem to be working on answers to secure smart cities, but in many ways it's like the early days of cloud computing with everyone building their own solutions.

Who cares about smart city security?

Who cares about smart city security?

There is a fierce debate raging over smart city security, with one side fueling the hype while the other conjures nightmare scenarios. The trouble is that the debate is silent, siloed and unproductive.

Does security awareness training need a new, stronger name?

Does security awareness training need a new, stronger name?

Security awareness training can help change the security culture through ongoing attention on relevant topics like social engineering. Nevertheless, stale, old, awareness material certainly doesn’t help and too many programs keep...

Why more security predictions and how can you benefit?

Why more security predictions and how can you benefit?

Why are security predictions more popular than ever right now? Is this trend to be encouraged or a stupid waste of time – as some have recently claimed? How can you benefit from studying cybersecurity predictions? Allow me to explain. ...

Seven things government security leaders expect vendors to address

What do government executives often think, but not share openly with their private sector partners? What traps to security companies of all sizes land in while trying to sell to the government market? Here are a few items that public...

Why is it so hard for security startups to get government customers?

Why is it so hard for security startups to get government customers?

Selling to governments is not hopeless for security startups, but it is very difficult. Here's a story to show why

The case for taking a government cyber job: 7 recommendations to consider

Cyber jobs are a hot topic right now for most age groups in America. Typical questions include: Which schools, programs and classes offer the best value for money? What certifications are needed to get into cybersecurity? Are public...

The Michigan Cyber Civilian Corps: Like a volunteer fire department for cybersecurity

Back at the Michigan Cyber Summit in October 2013, Governor Rick Snyder announced our new government plan for a: “Rapid response team that would assist the state and industries across Michigan during a major cyber incident.” The...

Focus cyber risk on critical infrastructure:  Remote substations are vulnerable

Focus cyber risk on critical infrastructure: Remote substations are vulnerable

Doug DePeppe has some especially strong feelings about protecting remote substations from cyber attacks. Here is his guest CSO blog to explain why.

Watch out Silicon Valley: Israel's cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

No More XP: CSOs Need to Engage Now

No More XP: CSOs Need to Engage Now

Migrating off of Windows XP has become an issue that has jumped to the top of the CIO priority lists all over the world. Is your enterprise ready? Are you engaged with the plan?

Could Syria launch a major cyberattack against the USA?

Should our leaders consider whether pro-Syrian forces might launch a cyberattack against US critical infrastructure in retaliation for military action? My view: American businesses should hope for the best, while preparing for the...

Two New Insider Threats to Consider

Recent headlines have highlighted what I believe are two new threats that have traditionally received minimal attention. These new insider threats include a new employee profile to consider and a series of disruptive technologies....

Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone

I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work.

BYOD is the new WiFi. Here's why

About a decade ago, the implementation of wireless networks was a very hot, even cutting edge, issue in computer security circles. The widespread mantra for CISOs at that time was: “WiFi is a bad idea.” In my view, BYOD is the new...

Google Chrome issues warnings while blocking ESPN.com and major websites

Google Chrome issues warnings while blocking ESPN.com and major websites

On Saturday, February 9, 2013, I was watching Valparaiso play Cleveland State in college basketball while checking on some sports scores. All of a sudden, a red box popped up from my Google Chrome browser which cut off the website and...

The Michigan Cyber Range: Who, what, when, where and how

What is a cyber range? Who needs a cyber range? Where can you go to learn more or to get your technology and security teams some of this advanced training?

Load More
Top Blog Posts