[vc_row][vc_column width=”1/1″][text_output]On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra’s Two-Day Knowledge Share was, The Four Vectors Targeting Intellectual Property. Those who have read, Secrets Stolen, Fortunes Lost will recognize the vectors to …
Prevendra’s CEO discusses cybersecurity with China TV
[vc_row][vc_column width=”1/1″][text_output]On February 13, 2015, US President Barack Obama signed “Executive Order — Promoting Private Sector Cybersecurity Information Sharing,” at the conclusion of his speech at Stanford University which hosted theWhite House Summit on Cybersecurity and Consumer Protection. The Executive Order speaks to the need for private companies, nonprofit organizations, executive departments and agencies, and others to be able to share …
VOA – “Careto” – ‘Mask’ malware – a cyber espionage operation
‘Mask” Malware Called ‘Most Advanced’ Cyber-espionage Operation – (February 13, 2014): Prevendra’s CEO, Christopher Burgess is interviewed by VOA about the Advanced Persistent Threat Malware – “Careto.” WASHINGTON — Researchers at the Internet security firm Kaspersky Lab say they have uncovered what they’re calling “one of the most advanced global cyber-espionage operations to date.” The malware is called “Careto,” which roughly …
Prevendra’s CEO on the BBC discussing the NSA reforms
BBC’s “World have your say” program discusses President Obama’s speech and his recommendations for National Security Agency (NSA) reforms. On 17 January 2014, Prevendra’s CEO, Christopher Burgess participated in the BBC’s World Service “World have your say” radio program. The 50+ minute program was dedicated to President Obama’s Presidential Policy Directive 28 (PPD-28) which provides his guidance on Signals Intelligence …
Homeland Security Today: No Vacancy – The daunting challenge of hotel security
In the December 2013/January 2014 issue of Homeland Security Today magazine, “No Vacancy – The daunting challenge of hotel security” discusses hotel security from the hotel’s perspective as well as that of those who might be lodging with the hotels. The author, Timothy W. Coleman, reached out to Prevendra’s CEO for commentary and perspective on what individuals should think about, especially given …
VOA: China hit by ‘Largest ever’ hack attack
China hit by ‘Largest ever’ hack attack – (August 26, 2013): Large parts of China’s Internet went dark this past weekend as the country came under what the Beijing government is calling the “largest ever” hack attack on Chinese sites. According to The China Internet Network Information Center (CNNIC), which “operates and administers country code top level domain of .cn and …
Nation States’ Espionage and Counterespionage – An overview of the Economic Espionage landscape of 2007
Though we are mid-way through 2013, I refer to a study I wrote in 2008 as it contains many data points applicable today. In 2008 I published via CSO Online a study on the Economic Espionage landscape of 2007, detailing how the many countries which share this world are both complaining at having been targeted or victimized, while others …
China’s intellectual property advance
Prevendra’s Christopher Burgess posted a piece on China in the Huffington Post – China’s Military – Here we are!, which noted how the People’s Republic of China (PRC) has been eating the West’s intellectual property lunch for the past 25+ years in accordance with the PRC”s published doctrine. Especially worthy of note for those following the national security and geopolitical …
Defining the causes of a data breach
I recently crafted a piece for Huffington Post, What’s a data breach, in which I defined the vagaries of the different types of causes of a data breach. While I list the different types, I welcome opinion on others, and urge you to read the Huffington Post piece for specific examples which ended in a data breach. Stolen …
Big Data Security is a must have
“Secure the data!” That’s the claxon call which every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to protect one’s data was to place it within the castle-keep behind high walls designed to withstand the attack from catapults …
VOA – Powerful Cyber-Attack Slows Internet
Power Cyber-Attack Slows Internet – (March 27, 2013) “: What some are calling the biggest cyber-attack ever is reportedly slowing down Internet connections around the world. At the root of the problem is an apparent dispute between two organizations — Spamhaus, a group of volunteers who work with companies to monitor and block email spammers, and Cyberbunker, a free-wheeling Dutch …
VOA – US Cyber Command to Take Offensive
US Cyber Command to Take Offensive – (March 15, 2013) “The U.S. Department of Defense has made a rare acknowledgement that it is developing offensive cyber capabilities. In testimony before the Senate Armed Services Committee this past week, Gen. Keith Alexander, director of the National Security Agency, said 13 cyber warfare “teams” would be ready by 2015.” …{snip}… Christopher Burgess, principal …
Security – Who is responsible?
Do you view your security posture in the office as more or less important in comparison to your residence? And how does that compare to the personal security profile that you exercise for you and your family? Who should be shouldering the security responsibility? I posit — you are responsible. And I would add that you also need to hold …
VOA – Hacking: Not just China
Hacking: Not Just China – (February 21, 2013) “Computer hacking by the Chinese has been causing a stir in recent weeks, but experts warn that focusing too much on Beijing could open the door to cyber spies from other countries the U.S. government is monitoring. For example, the most recent National Intelligence Estimate, a classified document said to represent a consensus …
El Pais – Propaganda a golpe de tuit
Propaganda a golpe de tuit – (Febrero 3, 2013) “En agosto de 2011, el portavoz del Ejército israelí, Avi Benayahu, anunció que buscaban alistar combatientes que supieran utilizar con pericia “los nuevos medios”. La razón era simple: “Las redes sociales son un arma estratégica”, explicó. Y por ello, las Fuerzas Armadas buscaban a jóvenes que se hubieran criado en “la …
Bringing the Social Media #Revolution to Health Care (Mayo Clinic)
On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities you owe it to yourself to get this book. More than 20 individual contributors made this book possible, with the …
Victims of Bullying need to know they can survive
The suicide death of 15 year-old Amanda Todd was a preventable and tragic event. Her mother, Carol Todd, has asked that her daughter’s death be used as a means to prevent the death of another child. Our children need to understand that suicide is not the coping option. That one can survive being bullied. That we all make mistakes, that we all are stronger when we have a support system to lean on.
Chris Pirillo, a man who I admire very much, has a suggestion – a one-day conference for children to learn that bully victims can and do survive and most importantly for them to know that life is worth living. I am supporting Chris in his effort to put such a conference together. I solicit your support, spiritual, fiscal, and participatory.
Freedom is seldom free
Freedom is seldom free – served to remind all of us why we were serving our nation abroad. It also served to remind us that our freedoms, such as religious freedom and freedom of speech, are not universally enjoyed.
“When Christians are subject to insults to their faith, and that certainly happens, we expect them not to resort to violence. When Hindus or Buddhists are subjected to insults to their faiths, and that also certainly happens, we expect them not to resort to violence. The same goes for all faiths, including Islam.”
“We can pledge that whenever one person speaks out in ignorance and bigotry, ten voices will answer. They will answer resoundingly against the offense and the insult, answering ignorance with enlightenment, answering hatred with understanding, answering darkness with light; that if one person commits a violent act in the name of religion, millions will stand up and condemn it out of strength.”
Children as a commodity – Human Trafficking & Sex Trafficking
Those who are unfamiliar with the terms “sex trafficking” or “human trafficking” I hope will envision children being bought and sold, for the use of others – child slavery would also be an apropos term. This isn’t isolated to some poor unfortunates in a far away land. Look around and you will see it; look around and understand. The year is now 2012 and we continue to see an ever increasing number of fellow humans being trafficked and enslaved. In fact, the number of persons believed to be enslaved in 2012 is at its greatest level in the history of mankind.
Unintended Consequences – Time for a paradigm shift
On 2 November, I gave a talk, “Unintended Consequences” at Gnomedex. I spoke to the need to recognize that “always-on” isn’t necessarily always good. I went on to describe the train-wrecks which occur when technology which is created for good, is used in a manner, unintended. I then shared the stories of 36 young people who we lost in 2010 due to being overwhelmed, both online and off.
- Page 1 of 2
- 1
- 2