iOS app Android app

Cyber Attacks

Rio 2016 -- A Gold Medal For Cybersecurity?

Scott J. Shackelford | Posted 08.12.2016 | Technology
Scott J. Shackelford

For criminals, the Olympic Games afford a target-rich environment in which a nearly half million visitors from around the world converge in a place already well known for its cyber insecurity.

The Digital Underworld: What You Need to Know

Doug Irving | Posted 07.26.2016 | Technology
Doug Irving

Illustration by Meriel Waissman Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or ...

Being Governed by Man-made Risk

Daniel Wagner | Posted 07.17.2016 | Business
Daniel Wagner

The world is being consumed by unforeseen man-made events that have taken the pundits and prognosticators by complete surprise. Whether it is the outc...

The Growing Threat of Cyber-Attacks on Critical Infrastructure

Daniel Wagner | Posted 05.24.2016 | Business
Daniel Wagner

Despite the fact that cyber-attacks occur with greater frequency and intensity around the world, many either go unreported or are under-reported, leaving the public with a false sense of security about the threat they pose and the lives and property they impact.

U.S. Indicts 7 Iranian Hackers For Cyber Attacks On Banks, New York Dam

Reuters | Adam Goldberg | Posted 03.24.2016 | Politics

WASHINGTON (Reuters) - The Obama administration on Thursday announced the indictment of seven Iranian hackers for a coordinated campaign of cyber atta...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.12.2016 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

The NYC Security Risk That Candidates Aren't Discussing

Michael Shank, Ph.D. | Posted 01.29.2016 | New York
Michael Shank, Ph.D.

We should do everything in our power to transition the bright minds at IPEC into the clean renewable energy sector in New York, which is growing daily. Let's keep them employed -- and then some. But most importantly, let's keep this country safe.

House Will Vote on Bill That Would Expose Many Americans to Online ID Theft

Alex Formuzis | Posted 01.05.2016 | Politics
Alex Formuzis

The bill, pushed by the U.S. Chamber of Commerce and corporations including Koch Industries and Honeywell International, would force the online disclosure of sensitive personal information of sick and dying asbestos victims seeking compensation for their illnesses.

The Need for Private-Public Partnerships Against Cyber Threats -- Why A Good Offense May be Our Best Defense.

Daniel Garrie | Posted 01.04.2016 | Business
Daniel Garrie

The Internet has delivered on its promise of social and economic progress. Unfortunately, it has also delivered unprecedented opportunities for scaling global conflict, terrorism, criminal activity, state and industrial espionage and vandalism. These risks continue to expand.

On Climate Change and Cyber Attacks

Scott J. Shackelford | Posted 12.01.2015 | World
Scott J. Shackelford

It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change a...

Six Ways You Could Become a Victim of Man-in-the-Middle (MiTM) Attacks This Holiday Season

Michael Gregg | Posted 11.12.2015 | Technology
Michael Gregg

The man-in-the-middle attack is a tricky one for consumers because most of the time victims don't even know they've been hacked. It's a silent attack and hard to detect unless you know what you're looking for.

Another 'Back to the Future' Moment - 27 Years After the World's First Cyber Attack

Scott J. Shackelford | Posted 10.30.2015 | Technology
Scott J. Shackelford

Twenty-seven years ago on November 2, 1988, Robert Morris, then a Cornell University grad student, made history by launching the first "Internet worm" from MIT. Meant, according to Morris, to gauge the size of the Internet, the worm morphed into a denial of service exploit.

Airlines Work Together To Declare War On Cyber Attackers

Reuters | Lorenzo Ligato | Posted 10.26.2015 | Technology

The aviation industry is stepping up efforts to enlist coordinated international support in the battle against the threats posed to airlines and passe...

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

How Moral Reasoning in Business Can Provide You with the Best Course of Action - Part 2

Tom Garrubba | Posted 09.25.2015 | Business
Tom Garrubba

the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.

Understanding Cybersecurity Due Diligence

Scott J. Shackelford | Posted 09.16.2015 | Technology
Scott J. Shackelford

International law, while informative, does not spell out how nations (or companies under their jurisdiction) should go about enhancing their cybersecurity to account for emerging due diligence obligations. As a result, it's helpful to consider what leading nations and firms are doing in this regard.

How Moral Reasoning in Business Can Provide You with the Best Course of Action - Part 1

Tom Garrubba | Posted 09.04.2015 | Business
Tom Garrubba

Though I am not a psychologist, I have spent many years managing teams, leading projects, and advising people - experiences that have helped me realiz...

Suggestions for Political Campaigns Using the Latest Digital Tools

Rebecca Abrahams | Posted 07.01.2016 | Technology
Rebecca Abrahams

Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.

Encryption: An Important Protection For Content And Communications

The Next Ten Challenge | Posted 06.15.2016 | Media
The Next Ten Challenge

This advice was tweeted by Eva Galperin of the Electronic Frontier Foundation, a San Francisco-based organization committed to the defense of privacy and Internet freedom. She meant everybody should use this tool to protect all of their online communications.

Federal and Private Sectors' Approaches to Cyber Collide

Peter B. LaMontagne | Posted 06.21.2015 | Technology
Peter B. LaMontagne

In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'

Sustainable Cybersecurity

Scott J. Shackelford | Posted 06.02.2015 | Technology
Scott J. Shackelford

In the search for analogies to get a better handle on the multifaceted cyber threat, we should not ignore the green movement. Consider the Aria hotel in Las Vegas, which is famous for more than its slot machines -- it is also known for its wet towels.

17 Tips You Can Do Today to Protect Your Online Passwords

Arkady Bukh | Posted 05.06.2015 | Technology
Arkady Bukh

Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.

Are Banks In Store For An 'Armageddon' Cyber Attack?

HuffPost Live | Posted 03.02.2015 | HuffPost Live 321

As with most things in the modern age, our banking has largely shifted from physical, brick-and-mortar banks to a "secure" website or app that handles...

Defending Data Post-Anthem

Brian E. Finch | Posted 04.14.2015 | Business
Brian E. Finch

Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.