Last month, my team launched a new white paper, “International Cybersecurity Norms, Reducing conflict in an Internet-dependent world” at the EastWest Institute’s 2014 Global Cyberspace Cooperation Summit in Berlin. In the paper we explained the unique cyber risks posed by nation states’ offensive activities, and how these risks could escalate – perhaps unintentionally – to…Read more Six Proposed Norms to Reduce Conflict in Cyberspace
In today’s high tech world, individuals from around the globe can comment in real time on others social media posts and current events instantaneously. With just a few keystrokes, data, thoughts and ideas can reach around the world. In this fast paced environment, consideration of what you choose to share and to whom is more…Read more Privacy considerations in a cloudy world
(Note: Microsoft Active Protection Service is now called Windows Defender Antivirus cloud protection service. Read about it in this blog entry: Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware.) Malware can easily send a huge enterprise infrastructure into a tailspin. However, you can get greater protection from malware by using…Read more MAPS in the cloud: How can it help your enterprise?
Last month, I had the honor of moderating a panel of esteemed executives at the 2014 Evanta CIO Executive Summit in Chicago, Illinois. The topic for discussion was “Navigating Security in the Age of the Breach.” The panelists included Paul Martin, CVP & CIO Baxter International Inc., Preston Simons, VP, IT & CIO Abbott, and…Read more Navigating Security in the Age of the Breach at the Evanta CIO Executive Summit