Guest Columns

Small Business Owners Take Action On Cyber Security

GLENVIEW, IL - A new survey says the majority of small business owners are concerned about breaches to their Internet and electronic security. As cyber security hacks have become an increasingly prevalent issue, 60 percent of small business owners said they are concerned enough that they are taking extra precautions including firewalls, offsite protected servers,

By |2015-09-08T00:00:00-04:00September 8th, 2015|Archive, Guest Columns|

Greetings From ISACA Detroit Chapter President

Dear Detroit ISACA Chapter Members, Hello from Linda Kearney CISA, CIA, CIPP-US ISACA Detroit Chapter President I hope everyone is having a great summer. Since we last met in May, the Detroit Chapter Board Members have been busy planning the 2015-2016 year, which we hope to make enjoyable and relevant to the interests of our

By |2015-09-04T00:00:00-04:00September 4th, 2015|Archive, Guest Columns|

The Internet of Everything Is Here – How Do We Secure It?

LIVONIA - September 16 ISACA Detroit Chapter Meeting Pre-Dinner Topic will focus on the Internet of Things and Information Assurance, while the after-dinner topic will be Demonstrating Information Security Program Effectiveness. The Pre-Dinner presentation will be made by Keith Wilson, Systems Engineer, Lancope After-Dinner speaker is Doug Copley, Beaumont Health Systems. 4:30 - 5:00 Registration

By |2015-09-04T00:00:00-04:00September 4th, 2015|Archive, Guest Columns|

Ashley Madison Break Shows Hackers Shifting Strategies

  SAN FRANCISCO - When hackers broke into the dating website for adulterers, AshleyMadison.com, stealing customer lists and corporate secrets, they asked for just one thing -- shut down the website within 30 days, or face total embarrassment. The site didn't shut down, and this week the hackers followed through on their threat, releasing alleged customer lists,

By |2015-08-28T00:00:00-04:00August 28th, 2015|Archive, Guest Columns|

Security Questions In Jeopardy After IRS Hack

WASHINGTON DC - Many people rely on security questions like "What's your mother's maiden name?" to protect their personal information online, but hackers are getting better at finding the answers. Case in point: the hackers who raided US Government's Internal Revenue Service data systems. Those attackers were much more successful at answering security questions than

By |2015-08-21T00:00:00-04:00August 21st, 2015|Archive, Guest Columns|

Baker College Student Team Wins Capture The Flag Contest

JACKSON - A Baker College of Jackson student cyber defense team won the annual Capture the Flag contest affiliated with two recent Detroit professional information security (InfoSec) conferences. The team competed against four corporate information security teams. The winning team members are Jackson residents Benjamin Carroll, Benjamin Clark and Jacob Layher. Each was awarded a

By |2015-08-12T00:00:00-04:00August 12th, 2015|Archive, Guest Columns|

Automation Alley Hosts Aerospace, Defense Industry Event

TROY - Automation Alley on Aug. 25 will bring aerospace and defense industry insight to the Southeast Michigan business community with a global business outlook event tailored to small and medium-sized businesses that are looking to diversify. The event will be held from 8 a.m. to noon at Automation Alley headquarters in Troy. "All too

By |2015-08-12T00:00:00-04:00August 12th, 2015|Archive, Guest Columns|

Russians Hack Pentagon eMail System

WASHINGTON DC - It looks like Russian hackers made a significant breach into the Pentagon's email system. Officials tell NBC News that Russia has launched a "sophisticated cyberattack" against the unclassified email system of the Joint Chiefs of Staff. The hack has forced the Pentagon to shut down the email system for almost two weeks

By |2015-08-07T00:00:00-04:00August 7th, 2015|Archive, Guest Columns|

Firmware Vulnerabilities Also Impact MACs

SAN FRANCISCO - The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren't. It turns out this isn't true. Two researchers have found that several known

By |2015-08-03T00:00:00-04:00August 3rd, 2015|Archive, Guest Columns|