CISO 2020: Will you be ready?

What are the key traits that CSOs and CISOs need to manifest in order to survive in our ever-changing, even hostile, cyber world? Last Friday evening, I had the honor and privilege of offering the opening keynote speech for CISOs, as...

Marketing security: True stories strengthen numbers for making point

How do security pros typically make the case for more, better or stronger security? Answer: Numbers - big numbers! I recommend adding a few stories.

The Time is Right for The International Cybersecurity Dialogue

Ever since I became Michigan’s first Chief Information Security Officer (CISO) in 2002, I have noticed a disturbing gap between front line users, security technologists and many senior policy makers. What can I suggest in the way of a...

Titanic Mistakes: Five Pragmatic Lessons from Spectacular Technology Failures

Everyone is talking about the sinking of the Titanic – and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...

Stuck in CAPTCHA Hell: When Security Disables

A CAPTCHA popped up questioning my credentials. “Darn, I hate when this happens,” I thought. “No worries, I’ve been through this security checkpoint before.” I typed in the two different words with the fuzzy characters. “Is there a...

Real Government Cloud Computing Efforts

What’s really going on with cloud computing in government? That’s been the key question for both public and private sector technology and security leaders over the past few years. Other perplexing issues include: Are the savings real?...

Privacy, Piracy and Parental Controls: Where In the World Are We Going in 2012 And Beyond?

It’s that time of year when we look back to reminisce on the past and look forward and attempt to predict what’s coming next. What’s the prize? If you can figure out this maze correctly, you can pretty much predict the future of the...

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 3 - Wrap-up)

We are discussing technology’s role in reducing the insider threats using a SIEM solution. In the previous installments of this blog series we have established the need for a SIEM solution and determined roles needed to implement this...

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 2)

This article is about roles and they are as important in government IT as they are in the NBA. The roles and responsibilities required for successful SIEM implementation and the importance of establishing clearly defined roles cannot...

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 1)

Think of SIEM as an insurance policy, one you hope to never have to make a claim against. This is exactly why each organization should consider implementing a SIEM solution… ”To keep the bad guys out and keep the good guys good.” This...

Blogging Cybersecurity: Looking Back at the Best, Worst and Most Surprising

Blogs have a strange way of defining a person. Looking back, it’s been an unexpected five year journey that, when you connect the dots, may point to future cyber events for all of us. Mark Twain once wrote this: “It is not worthwhile...

Why Government Security Pros Are Vital

Are all of the top cybersecurity pros in the private sector? Is a move out of government inevitable for the best and brightest (due to pay differences)? Should all government security be outsourced? Why is it important to have solid...

Can Online Indulgence Be Managed? Lessons From Dr. Jekyll and Mr. Hyde

I recently read an intriguing Harvard Business Review blog by Alexandra Samuel entitled: "The Three Ps of Online Indulgence." This viral guidance begins with the topic of well-known adults displaying split personalities online. I...

Rail Security: Is It Time for a Policy Change?

If it is true that Ohio officials were alerted regarding a railroad threat from al-Qaeda, it seems that we need to take this rail security matter more seriously. If rail security included the scanning and protection of luggage on...

Trusted Identities in Cyberspace: Why a New National Strategy is a Good Idea

Back on April 15, the Obama Administration released the National Strategy for Trusted Identities in Cyberspace (NSTIC). We need this strategy to work. Here's why:

New Cyber Opportunities: Security Business is Growing and Changing

Over the past few weeks there have been two very different reports released that offer helpful insights and answer important questions regarding the red hot cyber security market.

iPads are Hot in Government Enterprises– What’s Next?

iPad mania is here, and I’m now convinced that this isn’t a fad. From the Governor’s office to newly appointed department directors to staff bringing in personally owned “Christmas presents,” almost everyone either has or wants an...

Cyber Monday & Redefining Acceptable Use – Again

Trevor usually spends about six hours each year shopping online for Christmas presents at the office. A few years back he would save the final step, making the actual purchase, for his home PC. But now he feels comfortable enough to...

Busted Hackers: Insiders Doing Jail Time

After a recent session at Secureworld in Detroit, I was asked: Do internal hackers really get caught? That is, can you name people who lost their jobs? Or, do unethical or illegal activities really lead to jail time? Can you provide...

Technology Priorities Are Still Consolidation and Security

When I’m researching hot trends in technology, I like to look across “the pond” and include our European colleagues in the mix. What I find interesting is that the more things change, the more they seem to stay the same.

Load More
Top Blog Posts