Author Archive

Work Life Balance

Make no mistake about it, when you get involved in the STEM fields, and cyber security in particular, the demands on your time will increase. The reason for this is that there is a huge gap between what is done and what...  [Read More]

Business Leaders Discuss Cyber Security Issues at Davos

An estimated 1,700 private jets landed last week in Davos, Switzerland with heads of state and corporate executives for the World Economic Forum (WEF). For four days, leaders around the world discussed key issues and topics as diverse as Mindful Meditation to...  [Read More]

Proposed Data Breach Notification Law for Businesses

As could be expected after the Sony Pictures data breach, The White House is again sponsoring a national data breach notification law. Previous attempts to pass legislation have not be successful at the national level. This time, increased visibility of the impact...  [Read More]

NCI’s Initiative for Women in Cyber Security…Problem Solving in Cyber

Cyber security continues to be one of the hottest topics in the digital community as well as one of the greatest opportunities for women in technology. It is a hot topic due to the ongoing deluge of news reports of big box...  [Read More]

Attack from the Inside

A good amount has been written about the cyber attack that was launched at SONY’s digital network recently. There have been charges and counter charges about exactly who is behind the attacks with many fingers pointing at North Korea as the culprits....  [Read More]

Data Monitoring – Key to an Early Detection

If you read some of the details of the recent Sony attack, one striking revelation is that over 100 terabytes of information was stolen during the attack – movies, scripts, data, email archives, and apparently anything else in sight. The lesson here...  [Read More]

The Enterprise Strikes Back! The Question of Cyber-Attack Retaliation by Private Companies

‘Yes! We want to get ‘em back! They hacked our network and that has cost our company millions of dollars!’ That is probably how many seasoned CIO, CTO or other members of a company’s C-Suite would like to respond after a major...  [Read More]

Webinar: Cyber Insurance

Join us for this FREE webinar on January 28, 2015 from 1:00 to 2:00 pm (ET). Register for the event now. In recognition of Data Privacy Day 2015, NCI is organizing a webinar on Cyber Insurance. In today’s risky environment, it’s not...  [Read More]

Webinar: Introduction to Cybersecurity: Personal & Physical Security

Join us for this FREE webinar on January 26, 2015 from 1:00 to 2:00 pm (ET). Register for the event now. The Internet and computers are becoming increasingly important in our everyday lives. We use computers at work and at home and...  [Read More]

10 Cyber Security Measures for Third Party Providers

Once you have your cyber security measures in place, you need to think about the business partners you use. How good do you think their cyber security measures are? Have you asked? Have you provided guidance that meets your requirements? Have you...  [Read More]