The Four Vectors Targeting Intellectual Property

[vc_row][vc_column width=”1/1″][text_output]On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra’s Two-Day Knowledge Share was, The Four Vectors Targeting Intellectual Property. Those who have read, Secrets Stolen, Fortunes Lost will recognize the vectors to …

Prevendra’s CEO discusses cybersecurity with China TV

[vc_row][vc_column width=”1/1″][text_output]On February 13, 2015, US President Barack Obama signed “Executive Order — Promoting Private Sector Cybersecurity Information Sharing,” at the conclusion of his speech at Stanford University which hosted theWhite House Summit on Cybersecurity and Consumer Protection. The Executive Order speaks to the need for private companies, nonprofit organizations, executive departments and agencies, and others to be able to share …

Media – News – Commentary

[vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/2″][callout type=”center” button_icon=”tablet” circle=”true” target=”blank” title=”Media?” message=”Expert commentary? Expert analysis? Local, National or International focus?” button_text=”Click the drop-down to the right” href=”” id=”” class=”” style=””][/vc_column][vc_column fade_animation_offset=”45px” width=”1/2″][feature_headline type=”center” level=”h3″ looks_like=”h3″ icon=”video-camera” id=”” class=”” style=””]FAQ for Media[/feature_headline][line][accordion id=”Media FAQ” class=”” style=””][accordion_item parent_id=”” title=”Television ” id=”” class=”” style=””]Green screen with Seattle backdrop. With or without bottom third 1080i …

Homeland Security Today: No Vacancy – The daunting challenge of hotel security

In the December 2013/January 2014 issue of Homeland Security Today magazine, “No Vacancy – The daunting challenge of hotel security” discusses hotel security from the hotel’s perspective as well as that of those who might be lodging with the hotels.  The author, Timothy W. Coleman, reached out to Prevendra’s CEO for commentary and perspective on what individuals should think about, especially given …

Transparency International measures global corruption

Critics say the NGO’s Corruption Perceptions Index conveys an ‘elite bias’ and doesn’t show evidence of actual corruption

Data breaches in healthcare – The UW data breach

Data breach at the University of Washington – October 2013 In early October 2013 a University of Washington Medicine (UW Medicine) employee opened an email attachment and in doing so launched a piece of malicious software (aka *malware*). The employee’s computer was taken over by the malware and with that action approximately 90,000 patients had their data accessed by criminal …

Prevendra’s Small Print – Transparency

Transparency! ——————————- Transparency is important.  It allows you: our readers, clients and potential clients complete visibility and understanding of how Prevendra will conduct business. We do connect to other sites through which commerce is conducted.  Amazon for example, where we market our printed works and those of others.  That site may note you arrived from Prevendra.  In addition, should you …

VOA: China hit by ‘Largest ever’ hack attack

China hit by ‘Largest ever’ hack attack – (August 26, 2013):  Large parts of China’s Internet went dark this past weekend as the country came under what the Beijing government is calling the “largest ever” hack attack on Chinese sites. According to The China Internet Network Information Center (CNNIC), which “operates and administers country code top level domain of .cn and …

China’s intellectual property advance

Prevendra’s Christopher Burgess posted a piece on China in the Huffington Post – China’s Military – Here we are!, which noted how the People’s Republic of China (PRC) has been eating the West’s intellectual property lunch for the past 25+ years in accordance with the PRC”s published doctrine. Especially worthy of note for those following the national security and geopolitical …

Defining the causes of a data breach

I recently crafted a piece for Huffington Post, What’s a data breach, in which I defined the vagaries of the different types of causes of a data breach.  While I list the different types, I welcome opinion on others, and urge you to read the Huffington Post piece for specific examples which ended in a data breach.     Stolen …

VOA – Powerful Cyber-Attack Slows Internet

Power Cyber-Attack Slows Internet – (March 27, 2013) “:  What some are calling the biggest cyber-attack ever is reportedly slowing down Internet connections around the world. At the root of the problem is an apparent dispute between two organizations — Spamhaus, a group of volunteers who work with companies to monitor and block email spammers, and Cyberbunker, a free-wheeling Dutch …

Prevendra: U.S. National Industrial Security – NISPOM Training Requirement

For U.S. Defense Contractors, the National Industrial Security Program Operating Manual (NISPOM) is the bible of process, procedure and how things are accomplished for every contractor.  Additionally, every cleared employee must be provided security training.  And you the contractor or the contractor’s security representative are responsible for its creation and presentation.  Your cleared personnel are also individually responsible, as noted …

Privacy – Prevendra’s Small Print

Prevendra’s Privacy Policy —————————————————— At Prevendra your information is your information, when you share it with us, it remains your information. We will use the information for the stated purpose, and we will ask you if you would like us to keep you in the loop.  We’ll even give you the opportunity to subscribe to our updates – a clear …

VOA – US Cyber Command to Take Offensive

US Cyber Command to Take Offensive – (March 15, 2013) “The U.S. Department of Defense has made a rare acknowledgement that it is developing offensive cyber capabilities. In testimony before the Senate Armed Services Committee this past week, Gen. Keith Alexander, director of the National Security Agency, said 13 cyber warfare “teams” would be ready by 2015.” …{snip}… Christopher Burgess, principal …

VOA – Hacking: Not just China

Hacking: Not Just China  – (February 21, 2013) “Computer hacking by the Chinese has been causing a stir in recent weeks, but experts warn that focusing too much on Beijing could open the door to cyber spies from other countries the U.S. government is monitoring. For example, the most recent National Intelligence Estimate, a classified document said to represent a consensus …