When I was growing up there were not a lot of female role models in technology. Then again, there also were not that many female role models that worked outside the home. But in my community, there was always a firm belief that females could do whatever they wanted to do. This mentality was built […]

The security world, as many specialty fields, is full of acronyms. Those of us in the business know a SIEM from an IPS from a NGFW, and we’re happy to explain the difference to customers, many of whom know exactly what we’re talking about. There’s one set of acronyms, though, that can be confusing: APTs […]

Everyone loves a good deal—including hackers. Unfortunately, after a brief quiet period in the world of data breaches, it appears as though Goodwill Industries, purveyor of second-hand clothing and goods, may be suffering from a series of credit card breaches nationwide. This is especially troubling as it affects a group of people who may be […]

When I turned 25, I saw this as a pretty big milestone in my life.  At 25 years old, I felt like a true adult – I was now all grown up.  I was educated, employed, experienced and stable.   But when I look back, the journey from childhood to adulthood was really far from over […]

This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday panel entitled “WMD: The Nightmare Scenario,” discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electric grid, and industrial systems such as chemical plants. Cyberspace is now widely acknowledged […]