iOS app Android app

Cyber Attacks

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.12.2016 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

The NYC Security Risk That Candidates Aren't Discussing

Michael Shank, Ph.D. | Posted 01.29.2016 | New York
Michael Shank, Ph.D.

We should do everything in our power to transition the bright minds at IPEC into the clean renewable energy sector in New York, which is growing daily. Let's keep them employed -- and then some. But most importantly, let's keep this country safe.

House Will Vote on Bill That Would Expose Many Americans to Online ID Theft

Alex Formuzis | Posted 01.05.2016 | Politics
Alex Formuzis

The bill, pushed by the U.S. Chamber of Commerce and corporations including Koch Industries and Honeywell International, would force the online disclosure of sensitive personal information of sick and dying asbestos victims seeking compensation for their illnesses.

The Need for Private-Public Partnerships Against Cyber Threats -- Why A Good Offense May be Our Best Defense.

Daniel Garrie | Posted 01.04.2016 | Business
Daniel Garrie

The Internet has delivered on its promise of social and economic progress. Unfortunately, it has also delivered unprecedented opportunities for scaling global conflict, terrorism, criminal activity, state and industrial espionage and vandalism. These risks continue to expand.

U.S. Not Prepared To Defend Power Grid From Cyberattacks

AP | Lorenzo Ligato | Posted 12.22.2015 | Technology

SAN JOSE, Calif. (AP) -- Security researcher Brian Wallace was on the trail of hackers who had snatched a California university's housing file...

On Climate Change and Cyber Attacks

Scott J. Shackelford | Posted 12.01.2015 | World
Scott J. Shackelford

It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change a...

Six Ways You Could Become a Victim of Man-in-the-Middle (MiTM) Attacks This Holiday Season

Michael Gregg | Posted 11.12.2015 | Technology
Michael Gregg

The man-in-the-middle attack is a tricky one for consumers because most of the time victims don't even know they've been hacked. It's a silent attack and hard to detect unless you know what you're looking for.

Another 'Back to the Future' Moment - 27 Years After the World's First Cyber Attack

Scott J. Shackelford | Posted 10.30.2015 | Technology
Scott J. Shackelford

Twenty-seven years ago on November 2, 1988, Robert Morris, then a Cornell University grad student, made history by launching the first "Internet worm" from MIT. Meant, according to Morris, to gauge the size of the Internet, the worm morphed into a denial of service exploit.

Airlines Work Together To Declare War On Cyber Attackers

Reuters | Lorenzo Ligato | Posted 10.26.2015 | Technology

The aviation industry is stepping up efforts to enlist coordinated international support in the battle against the threats posed to airlines and passe...

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

How Moral Reasoning in Business Can Provide You with the Best Course of Action - Part 2

Tom Garrubba | Posted 09.25.2015 | Business
Tom Garrubba

the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.

Understanding Cybersecurity Due Diligence

Scott J. Shackelford | Posted 09.16.2015 | Technology
Scott J. Shackelford

International law, while informative, does not spell out how nations (or companies under their jurisdiction) should go about enhancing their cybersecurity to account for emerging due diligence obligations. As a result, it's helpful to consider what leading nations and firms are doing in this regard.

How Moral Reasoning in Business Can Provide You with the Best Course of Action - Part 1

Tom Garrubba | Posted 09.04.2015 | Business
Tom Garrubba

Though I am not a psychologist, I have spent many years managing teams, leading projects, and advising people - experiences that have helped me realiz...

Suggestions for Political Campaigns Using the Latest Digital Tools

Rebecca Abrahams | Posted 07.01.2015 | Technology
Rebecca Abrahams

Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.

Encryption: An Important Protection For Content And Communications

The Next Ten Challenge | Posted 06.15.2015 | Media
The Next Ten Challenge

This advice was tweeted by Eva Galperin of the Electronic Frontier Foundation, a San Francisco-based organization committed to the defense of privacy and Internet freedom. She meant everybody should use this tool to protect all of their online communications.

Federal and Private Sectors' Approaches to Cyber Collide

Peter B. LaMontagne | Posted 06.21.2015 | Technology
Peter B. LaMontagne

In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'

Sustainable Cybersecurity

Scott J. Shackelford | Posted 06.02.2015 | Technology
Scott J. Shackelford

In the search for analogies to get a better handle on the multifaceted cyber threat, we should not ignore the green movement. Consider the Aria hotel in Las Vegas, which is famous for more than its slot machines -- it is also known for its wet towels.

17 Tips You Can Do Today to Protect Your Online Passwords

Arkady Bukh | Posted 05.06.2015 | Technology
Arkady Bukh

Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.

Are Banks In Store For An 'Armageddon' Cyber Attack?

HuffPost Live | Posted 03.02.2015 | HuffPost Live 321

As with most things in the modern age, our banking has largely shifted from physical, brick-and-mortar banks to a "secure" website or app that handles...

Defending Data Post-Anthem

Brian E. Finch | Posted 04.14.2015 | Business
Brian E. Finch

Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

After Decades of Conflict, Time to Engage North Korea's Kim Dynasty

Doug Bandow | Posted 03.12.2015 | World
Doug Bandow

A small, poor nation, the Democratic People's Republic of Korea should be an international nullity, irrelevant to global affairs. Yet it again dominated headlines in the U.S. with the hacking of Sony and cancellation of the broad release of the movie The Interview, a comedy featuring the assassination of the younger Kim.

Hysteria Over North Korean Hacking Is Unwarranted

Ivan Eland | Posted 02.21.2015 | Politics
Ivan Eland

Although John McCain's sidekick in threat exaggeration and bellicose strutting, Lindsay Graham, was outraged that President Obama called North Korea's action "cyber vandalism," that is probably the best description.

Could North Korea Take Over the Internet?

Scott J. Shackelford | Posted 02.20.2015 | Technology
Scott J. Shackelford

The vulnerabilities that Dr. Charlie Miller points to are real and require our attention if we are to ensure that fiction does not become reality, and that the most recent cyber attacks on Sony are the end and not the beginning of a new era in state-sponsored cyber attacks.

Solving the Threat to our Energy Grid

Rebecca Abrahams | Posted 01.21.2015 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems Admiral Michael Rogers, Director of the National Security Agency and head of the US ...