Share
Forbes, January 25, 2017

Four Things to Watch For In Your Cloud Blind Spots

Just as you need to be aware of blind spots when you drive your car, you also need to check for blind spots as you move your company to the cloud. Dazzled by the agility, capital expenditure reductions, efficiencies, and productivity gains the cloud offers, many chief information officers miss four dangers that are hidden in plain sight.
CNN Tech, January 19, 2017

Why the U.S. needs a Smokey Bear of cybersecurity

When it comes to dangerous things, the U.S. government has some pretty clever taglines and mascots. We all remember the bear with a big yellow hat who alerted to the perils of leaving a fire burning at a campsite. And the "buckle up for safety" PSA has been making the rounds for decades. But there are a number of intangible threats that aren't given the same attention as fire or car safety -- and that needs to change, according to Michael Kaiser, executive director of the National Cyber Security Alliance.
Associated Press, December 21, 2016

Don’t get cyber-scrooged! Tips for safe online shopping

’Tis the season to be jolly — but it’s also the season for identity theft, phishing and credit card fraud. With Christmas just days away, people are using their smartphones and other devices to get a handle on their last-minute shopping. Hackers are on the hunt as well, looking to steal personal information from easy targets.
Boston Globe, December 18, 2016

A civil defense for the cyber age?

The Russians are coming — again. So are the Chinese, the North Koreans, and an array of international bad actors, threatening American security — not with nuclear weapons but with computer hacks. The latest Russian gambit might even have tipped the recent presidential election toward Donald Trump.
The Guardian, November 5, 2016

Why cyber security should be a priority, by CSEAN

As cybercrime continues to take newer forms and adapt against even advanced cyber defence systems, cyber criminals are also adapting further into societal trends. The question of Nigeria’s strength or vulnerability remains a constant bug in the face of its growing technology-driven economy, where developed countries are continuously kept on their toes.
PC Magazine, October 25, 2016

What Businesses Can Learn From the Mirai Botnet DDos Attack

Sitting in a cybersecurity conference days after a massive cyberattack is a surreal feeling. In the midst of Cyber Security Awareness Month, the whole world is now looking with eyes wide open at Internet of Things (IoT) security after the historic distributed denial of service (DDoS) attack perpetrated by the Mirai botnet targeted these insecure gadgets.
ABC News, October 24, 2016

How Your Internet-Enabled Device Could Be Hijacked to Launch Cyber-Attacks

Your internet-linked baby monitor may be participating in a major cyber-attack, and you don’t even know it. While experts have been warning for some time that the proliferation of devices that make up the Internet of Things (IoT) -- like web-connected baby monitors, cars, smart speakers, DVRs and even cars -- posed a new threat in cyberspace, a major cyber-attack on Friday has given new impetus to calls to bolster the security of the devices, which are more popular than ever.