Ten Years After Bill Gates’ Trustworthy Computing Memo
Ten years ago yesterday, Bill Gates sent out his Trustworthy Computing memo that marked a significant change in the culture at Microsoft and put security, privacy and reliability at the center of the...
View ArticleFacebook and Online Dating Security
Two new postings from me today on Facebook and online dating security. Over at Windmill Networking, this month’s column is on Facebook pages and two things that you can do to improve your security and...
View ArticleInterviews on the Anthem Data Breach
I had a chance recently to talk with reporters from the Associated Press and the Hill about the recent Anthem data breach and what that means for online security and privacy for healthcare and what...
View ArticleInterview on KIRO 7 Seattle on Social Media Scams
I had a chance to talk with KIRO 7 news in Seattle recently about the current crop of social media scams plaguing Facebook, Twitter and Pinterest. Do you know what not to click on Facebook, Twitter?
View ArticleA Trip to the Doctor
Or, more accurately, the local urgent care clinic. I had to make a trip there today to get looked at for the latest crud that I’ve been battling for the last week. My check-in was a good example of how...
View ArticleComments on the Stratos Digital Wallet Card
I got to talk with KIRO Radio here in Seattle recently about some of the risks with new, untested digital wallet cards like the new offering from Stratos. Plus, my comments on how cash may make a...
View ArticleComment Article on the Clinton Email Server Issue
My latest posting over at Geekwire is my analysis and commentary on why Hillary Clinton using a “homebrew” email server is a major security problem....
View ArticleClinton Press Conference Transcript: Email Security Sections
For those following the Clinton Email Situation, I’ve gone ahead and taken the full press conference transcript that Time posted and have pulled out the sections that pertain specifically to questions...
View ArticleClinton Official Statement: Email Security Sections
Following up my posting of the relevant section of the press conference transcript, Business Insider has posted the full official statement as well. Here are the relevant sections related to email...
View Article“Hackback”: A New Approach
Today we read about the likely death in a drone attack of an ISIS hacker/warrior/cyber-jihadist:...
View ArticleInterview on Hacker Valley Studio
I had the pleasure of being interviewed by Ronald Eddings and Chris Cochran with Hacker Valley Studio talking about crisis communications and lessons learned from “making awful news just bad” in their...
View ArticleNew Proofpoint Blog Post: Back to School Online: 5 Steps to Better Protect...
As we get ready for back to school, I just posted a new blog on the Proofpoint blog: “Back to School Online: 5 Steps to Better Protect Your Children“.This posting covers five things you can do to help...
View ArticleInterview with BBC Online
I recently got to talk with Joe Tidy with the BBC Online about my work as a volunteer along with others as part of the University of Chicago’s Harris School of Public Policy Election Cyber Surge...
View ArticleGeekwire Article on Amazon Sidewalk
For my latest article on Geekwire, I dig into Amazon’s plans for their new Sidewalk offering looking at how they’ve chosen to deploy it using “forced opt-in”, how that mirrors and differs from...
View ArticleNew Geekwire Article: How the SolarWinds hackers are targeting cloud services...
In my latest Geekwire article “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack, I continue looking at the SolarWinds event, this time digging into the SAML token...
View ArticleThe Five Stages of “Hacked”
[Note: This scale is now posted on its own page here.] While doing some work around the SolarWinds hacks, I realized that there’s just no simple triage scale that we in the industry can use to simply...
View ArticleNew Geekwire Article: How hacked is hacked? Here’s a ‘hack scale’ to better...
My latest article is up on Geekwire: How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks. In this article I apply my “Five Stages of Hacked” to the ongoing...
View Article
More Pages to Explore .....