BECOMING A CYBER-AWARENESS CHAMPION
7.24.23 > Mark Ritchie I was sworn-in as Minnesota’s elected Secretary of State in January of 2007. During my first year in office, when I was still “learning the ropes,”…
7.24.23 > Mark Ritchie I was sworn-in as Minnesota’s elected Secretary of State in January of 2007. During my first year in office, when I was still “learning the ropes,”…
6.28.23 > Rohit Tandon We live in a world full of surprises. Sometimes events around us go unnoticed, and at other times similar events have the potential to disrupt. Smart…
6.26.23 > Rebecca Duvick I regularly get asked whether the data on equipment we receive as part of our electronics recycling program is truly gone after it’s wiped. The answer,…
6.21.23 > Jerrod Montoya There are now 10 comprehensive privacy laws enacted in the United States. The new laws in 2023 include those in Montana, Indiana, Iowa, Tennessee, and Texas.…
6.14.23 > Phil Schenkenberg Here in the United States, companies face a patchwork of legal obligations that address information security and data privacy. For example, federal laws target certain market…
6.7.23 > Tim Herman It is no secret that there is an ever-growing challenge with finding good people for the now nearly 750,000 open Cyber Security jobs in our country. …
6.1.23 > via InfraGard Cybersecurity Advisory - People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection Click this link to read the Cybersecurity Advisory >…
5.31.23 > Paul Hershberger I was recently engaged in a conversation with some colleagues in the cybersecurity industry and they posed a question along the lines of; 'how do you…
5.24.23 > Brian Kenyon Multi-factor authentication is — thankfully — a normal part of our digital experience. Whether at work, connecting with your bank, or logging in to social media,…
5.17.23 > Kristine (Kristy) Livingston This year the Cyber Security Summit theme is “Resilience Unlocked”. As we discuss and plan cyber resiliency in our security programs, leaders must prepare for…
5.15.23 > Scott Singer The impact of a cybersecurity attack on a medical device can have negative effects on patient safety. In addition, there are privacy concerns that can arise…
5.10. 23 SPECIAL NEWS ALERT CISA and Partners Disclose Snake Malware Threat From Russian Cyber Actors 05/09/2023 11:00 AM EDT Today, CISA and partners released a joint advisory for a…
5.8.23 > Aimee Martin Let’s start with definitions. Although there are many different definitions out there for security and compliance, here is a simplistic version: Security – systems, controls, and…
5.3.23 > Shayla Treadwell, Ph.D. As a cybersecurity professional, working in a volatile, uncertain, complex, and ambiguous world means consistently putting out fires. When thinking about putting out small fires,…
5.1.23 > CDR Chip Laingen, USN (Ret.), MPA My current roles in business and academia have afforded me two uniquely rewarding perches from which to view innovation, both in terms…