We are facing a big problem in the cybersecurity industry today – only about 11% cybersecurity professionals are women! So, I’d like to pass this message to all women at the International Women’s Day: Ladies, Cybersecurity Needs You! In fact, I believe, for many cybersecurity jobs, women can perform better than men! Here is why:read more
“Do not click the links in your email!”, “Do not use free wifi!”, “Do not install any 3rd party software!”, “Do not upload data to the cloud!”, “Do not enable the remote access!”… how many times have you heard such warnings from your cybersecurity team? It feels like...read more
“Can you tell me the difference among the cybersecurity strategy, cybersecurity program, and cybersecurity project?” This is a popular question asked when you are interviewed for a cybersecurity management position. Many people including some executives are not very...read more
It is the "RRROLL UP THE RIM TO WIN" promotion time again at Tim Hortons! To grab a coffee, you often have to line up a long line. But yesterday, the waiting time seemed to become forever. A computer virus knocked down the cash registers at so many Tim Hortons...read more
Today, I’d like to talk about a very basic question, “what is cybersecurity?” As a cybersecurity professional, I have been invited to many conferences, seminars, or meetups. I recall we had one meeting with universities and colleges to discuss how to design a...read more
"What is your cyber risk strategy?", this is a common question asked by your board of directors and executives. People often answer it from the angles of risk assessment, security governance, department budget, resource plan, or awareness training. While all of these...read more
I know, I know, it is Valentine's Day again! To our CISOs, Security Consultants, Security Analysts, make sure to book a romantic dinner for your special one and get your fancy gift ready. Otherwise, your risk level of relationship will be too high! Speaking of love, I...read more
“Does cybersecurity slow down my job?” This question often triggered a series of arguments on roles/responsibilities, authorities, priorities etc. In the end, the business leader had to jump in and make a decision, which was usually a kind of compromise. But the conflict between innovation and cybersecurity seemed to be an unsolvable problem.read more
For people who might not be familiar with this phrase, “Elephant in the Room” means we are facing an obvious problem, but no one wants to take the challenge.
Now, let me ask you: Is there also an elephant named “Cybersecurity” in your room?read more
“It’s zombie time”, a line said by the Cipher, a cold while beautiful hacking group leader in the newly released movie – Fast & Furious 8. Hackers effortlessly take controls of security cameras, mobile phones, cars, power plants, and even submarine. People around the world could do nothing to stop them. You may wonder, is it just a fictional story or something real?
Unfortunately, it well reflects the big challenge we are facing – the fast & furious of IoT Security!read more
$1 billion worth of United Airline’s market value gone – what you can learn from its incident response
This incident started with the United Airline overloaded a flight from Chicago to Lousiville. So, they had to ask for volunteers to take a later plane. Because no one wanted to do so, the airline randomly selected 4 passengers. While one chosen passenger refused to leave, the security officers wrestled the man out of the seat and dragged him down the aisle…
Very soon, the videos captured from the scene and numerous emotional comments were flooding social media sites. United Airline CEO apologized for the overbooking and this incident on Monday. However, people from everywhere are still condemning the airline. As a result, the company lost about $1 billion worth of the market value on Tuesday.
So, as someone in the Cybersecurity field, what can you learn from this breaking news?read more
There are only three most important words in Cyber Security. If you thoroughly understand them, you will better appreciate all other concepts and solutions.read more