About Adam K Levin | Contact | Videos

Technology


  • Cybersecurity jobs

    Unfilled jobs are the biggest threat to cybersecurityData Security, Cybersecurity, Technology

    Share

    Automation, a deeper talent pool and more women can help close infosec gap When asked, “what is the biggest threat to internet security?” the majority of quick-fire answers can likely be represented by the flags of a handful of nation states. Yet examining the nature of the industry, it can easily be argued that the biggest risk internet security faces is the general inability to respond to and counter attacks launched by adversaries. Today, it […]

  • Cyber defense

    We Need a National Cyber Defense AgencyColumn, Technology

    Share

    If you’re like most Americans, the idea that our country doesn’t have a unified cyber defense agency is about as unthinkable as a presidential contest between Donald Trump and Hillary Clinton. Welcome to the desert of the real. Our cyber defenses are scattered across three agencies that don’t always communicate well (a generous appraisal) or in a timely fashion, and we’ve never been more vulnerable. As Ronald Reagan (quoting John Adams) famously said during his […]

  • Boardroom cybersecurity

    TalkTalk takeaway: Cybersecurity is a boardroom issueData Security, Technology

    Share

    Enterprises, SMBs must gird for new rules and protect sensitive data – or pay hefty price British telecom giant TalkTalk actually may have gotten off lightly when privacy regulators hit the British telecom giant with a £400,000 ($496,910) fine last week for failing to prevent a major data breach. The fine, issued by the U.K.’s Information Commissioner’s Office is, indeed, for a record amount. And it will clearly hurt TalkTalk, both financially and in reputation. […]

  • social media hack

    What the Recent Yahoo Hack Really Means for YouPrivacy, Technology

    Share

    There has been a lot of talk about Yahoo being “the anti-Apple” when it comes to consumer privacy following last week’s news about a government order granting access to Yahoo Mail. Regardless of what happened there — and it is far from clear — recent reports underscore the need for more consumer awareness about best privacy practices. What’s Going Around It’s definitely been a bad news month for Yahoo starting with the revelation, on September […]

  • cyber warfare

    Cyber warfare will be battleground for next U.S. presidentPolitics, Technology

    Share

    When presidential candidates Hillary Clinton and Donald Trump debated America’s cyber war capabilities last week, the global cybersecurity community strained hard to read between the lines. The Democratic candidate, in particular, alluded to a notion rarely discussed in public forums: that Uncle Sam does, indeed, possess a very big cyber stick and is prepared, at any moment, to wield it as necessary. “We are not going to sit idly by and permit state actors to […]

  • Data Breach

    Without better security, massive Yahoo hack could be the new normData Security, Technology

    Share

    Stronger authentication, less dependence on passwords needed to thwart wide-scale data breaches It’s not the big one, but it’s close. Yahoo confirmed long-suspected reports that a hacker had accessed millions of customer passwords. The number, however, is a bit shocking even to a reporter who’s been writing this same story for the past 10 years. Five hundred million. For many years, I’ve prepared myself to report on a very, very large-scale data compromise that would […]

  • How to Tell If You’ve Been Hacked (& What to Do About It)Identity Theft, Technology

    Share

    Due to the countless ways we connect digitally, the odds of getting hacked are right up there with the likelihood of catching a cold — and like the common cold, you can increase or decrease your risk of exposure to germs that may make you miserable. The goal of a particular hacker may be the creation of a spamming-for-dollars botnet or cracking a target that requires an enormous amount of computing power. It might be […]

  • ransomware

    Tips to avoid becoming a victim of ransomwareData Security, Technology

    Share

    Ransomware is becoming one of the most profitable areas of cyber crime. In the past, cyber criminals would steal data, and then re-sell it. With ransomware, they block access to an individual or organization’s data by encrypting it, then selling the data’s owner a decryption key to regain access. And with the rise of hard-to-trace currency, such as bitcoin, there is less chance of getting caught. Organizations will pay for fear that they’ll lose their […]

  • cyber-security

    5 Cyber-Security Myths We Need to DitchData Security, Technology

    Share

    Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At 5’ 6”, his height was average in his day). “President Obama was the founder of ISIS.” (Oh, come on Donald!) […]

  • The talk

    Gone Phishing? How to Talk to Your Kids About MalwareData Security, Technology

    Share

    Picture this: The car is full. You’re navigating by the side mirrors while doing a mental inventory of everything you packed and wondering if you are going to make it to the realtor’s office in time to pick up the keys for your vacation rental. You have absolutely no idea what the kids are doing in the back seat. Now forget the massive distraction of that summer road trip and consider the bigger picture. It […]

LOAD MORE ARTICLES