John N. Stewart
Our World in Transition and Our Future Demands
Cybersecurity Awareness Month is a time to reflect on how far we’ve come, study the trends we face today, and look ahead to opportunities facing the security community and society.
Michele D. Guel Awarded 2016 ABIE Award for Leadership
The cybersecurity industry is one of change and disruption. The ability not only to sustain, but to flourish, over a 26-year career in this field requires a special level of...
Mission to Helsinki
I grew up in Northern New York State, so a trip to Helsinki in the middle of February held no fears for me. Interesting things are going on in Finland from a cybersecurity point of view, so I jumped at the chance to speak to the Security Day conference in Finland’s capital city. The conference […]
Security Geeks and Wonks Unite!
Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think that if the IT and security geeks and wonks of the world can unite, share information, work hard, and not worry about who gets the credit, we stand a fighting chance.
RSA 2013: That’s a Wrap
RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other...
Live from RSA: John N. Stewart
The RSA Conference is expected to be bigger and better than ever this year—more booths, more vendors, more technical sessions and keynotes. But I have to ask the question: “Are we as IT practitioners better off now than we were 4 or 5 years ago?” There are a lot of people at the show who […]
RSA Conference: T-Minus 30 Days and Counting
A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each […]
Network Attacks: The Who, What, Where and Why
As security practitioners, we generally see three types of perpetrators with different motives: Financial Political General trouble-making Each of these attackers can display various levels of organizational structure: Individual Well-organized, persistent group Ad-hoc groups pursuing a common purpose Each one of these subsets has their own techniques and goals, but unfortunately, can strike anywhere at […]
Cyber Security Survival for the Holidays
A couple of days ago, I participated in a Social Video Broadcast about cyber security survival tips for the holiday season. Some of my advice is familiar. Use stronger passwords, apply the “smell test” to too-good-to-be-true on-line offers, read the manual—especially the parts about account set up and security—when turning on a new device. Others […]
1