About Adam K Levin | Contact | Videos

Technology


  • cyber crime

    5 Shocking Indicators of a New Rise in Cyber CrimeData Security, Technology

    Share

    When it comes to studies, surveys and reports sent my way that dissect various nuances of the cyber wild, my cup runneth over. So, I’ve assembled a small grouping of revelatory proof points that convey the rising maliciousness made possible by the way we’ve chosen to live our digital lives–and also highlight specific cyber exposures that concern me greatly. The worse is yet to come. Some 72 percent of the security pros heading to the […]

  • toxic work environment

    How to Protect Your Data Without Creating a Toxic EnvironmentData Security, Technology

    Share

    There’s nothing quite like a company-wide directive to spread a sense of malaise at the office, especially when it’s about data security–worse yet if it comes in the wake of a data compromise. It is critical to approach the issue in a productive, non-threatening way. All the good intentions in the world can’t keep “information security” from instilling insecurity in the hearts of most employees. Call it “infosec,” as your company’s go-to insiders may be […]

  • Cybersecurity jobs

    Unfilled jobs are the biggest threat to cybersecurityData Security, Cybersecurity, Technology

    Share

    Automation, a deeper talent pool and more women can help close infosec gap When asked, “what is the biggest threat to internet security?” the majority of quick-fire answers can likely be represented by the flags of a handful of nation states. Yet examining the nature of the industry, it can easily be argued that the biggest risk internet security faces is the general inability to respond to and counter attacks launched by adversaries. Today, it […]

  • Cyber defense

    We Need a National Cyber Defense AgencyColumn, Technology

    Share

    If you’re like most Americans, the idea that our country doesn’t have a unified cyber defense agency is about as unthinkable as a presidential contest between Donald Trump and Hillary Clinton. Welcome to the desert of the real. Our cyber defenses are scattered across three agencies that don’t always communicate well (a generous appraisal) or in a timely fashion, and we’ve never been more vulnerable. As Ronald Reagan (quoting John Adams) famously said during his […]

  • Boardroom cybersecurity

    TalkTalk takeaway: Cybersecurity is a boardroom issueData Security, Technology

    Share

    Enterprises, SMBs must gird for new rules and protect sensitive data – or pay hefty price British telecom giant TalkTalk actually may have gotten off lightly when privacy regulators hit the British telecom giant with a £400,000 ($496,910) fine last week for failing to prevent a major data breach. The fine, issued by the U.K.’s Information Commissioner’s Office is, indeed, for a record amount. And it will clearly hurt TalkTalk, both financially and in reputation. […]

  • social media hack

    What the Recent Yahoo Hack Really Means for YouPrivacy, Technology

    Share

    There has been a lot of talk about Yahoo being “the anti-Apple” when it comes to consumer privacy following last week’s news about a government order granting access to Yahoo Mail. Regardless of what happened there — and it is far from clear — recent reports underscore the need for more consumer awareness about best privacy practices. What’s Going Around It’s definitely been a bad news month for Yahoo starting with the revelation, on September […]

  • cyber warfare

    Cyber warfare will be battleground for next U.S. presidentPolitics, Technology

    Share

    When presidential candidates Hillary Clinton and Donald Trump debated America’s cyber war capabilities last week, the global cybersecurity community strained hard to read between the lines. The Democratic candidate, in particular, alluded to a notion rarely discussed in public forums: that Uncle Sam does, indeed, possess a very big cyber stick and is prepared, at any moment, to wield it as necessary. “We are not going to sit idly by and permit state actors to […]

  • Data Breach

    Without better security, massive Yahoo hack could be the new normData Security, Technology

    Share

    Stronger authentication, less dependence on passwords needed to thwart wide-scale data breaches It’s not the big one, but it’s close. Yahoo confirmed long-suspected reports that a hacker had accessed millions of customer passwords. The number, however, is a bit shocking even to a reporter who’s been writing this same story for the past 10 years. Five hundred million. For many years, I’ve prepared myself to report on a very, very large-scale data compromise that would […]

  • How to Tell If You’ve Been Hacked (& What to Do About It)Identity Theft, Technology

    Share

    Due to the countless ways we connect digitally, the odds of getting hacked are right up there with the likelihood of catching a cold — and like the common cold, you can increase or decrease your risk of exposure to germs that may make you miserable. The goal of a particular hacker may be the creation of a spamming-for-dollars botnet or cracking a target that requires an enormous amount of computing power. It might be […]

  • ransomware

    Tips to avoid becoming a victim of ransomwareData Security, Technology

    Share

    Ransomware is becoming one of the most profitable areas of cyber crime. In the past, cyber criminals would steal data, and then re-sell it. With ransomware, they block access to an individual or organization’s data by encrypting it, then selling the data’s owner a decryption key to regain access. And with the rise of hard-to-trace currency, such as bitcoin, there is less chance of getting caught. Organizations will pay for fear that they’ll lose their […]

LOAD MORE ARTICLES