All posts by: Christopher Burgess

Kremlin’s Clinton Gambit Fails With Trump’s Election

A little over a month ago I wrote of the Russian gambit to influence the US national elections by seemingly backing the Republican party candidate Donald J. Trump in hopes that the US electorate would swing in mass to back... Read More

Insider Threat – Canadian privacy breached as PHI/PII goes missing in Manitoba

Patients in Manitoba are receiving notification from their healthcare providers, that their personal and sensitive information has been lost or inappropriately accessed. As all who have responsibility for the security of information, the insider threat is very real. Often times... Read More

Chinese Cyber Espionage: What’s leaving your smartphone?

This week we saw, possible evidence of, yet another form of the Chinese cyber espionage. Smartphones calling “home” to China with user data. This is every government’s worst counterintelligence and cyber security nightmare. We are warned, repeatedly about the threat... Read More

Agro Espionage – China’s corn espionage lead, MO Hailong, sentenced to prison

[cs_content][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 15px;”][x_columnize]One chapter of the saga of China’s agro espionage targeting US research and development of corn has come to a close with... Read More

Prevendra PSA: Vote in the 2016 US Election

[vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][text_output] “If you can’t vote my way, vote anyway, but VOTE!” These are the famous words heard from Okefenokee Swamp resident and three-time presidential candidate, Pogo as he implored the residents to VOTE!  I am Christopher Burgess,... Read More

Agro Espionage – Rice to China – Wengui Yan’s guilty plea

On 24 October 2016, Wengui Yan, an Arkansas resident, an employee of the USDA Dale Bumpers National Rice Research Center since 1996, and a naturalized US citizen originally from the PRC, successfully negotiated a plea-bargain with the Kansas US Attorney in... Read More

IP Theft: Crowdfunding sites harvested by Chinese counterfeiters

It should surprise no one to learn that the Chinese factories which are engaged the production of counterfeit goods produce goods which are identical or indistinguishable from the originals. The factories are engaged in intellectual property theft (IP theft) and are... Read More

Reliability disrupted when your data isn’t stolen, it’s changed

[vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px”][text_output]Competitors and nation states have long known that to disrupt your competition is often times all that is necessary in order to garner a competitive advantage. It is for this reason that all information security (infosec) practitioners... Read More

Where’s Your data and Can You Actually Get To It?

You arrive at work or home. You unload your laptop or go to your desktop and power up the system by pressing the “ON/OFF” button. Lights flicker; nothing happens. If you’re like me your mind races; you sigh and think,... Read More

Insider Threat Becomes Insider Theft: What’s your plan.

In a prime example of insider threat, becomes insider theft, we saw the FBI arrest and the Department of Justice file a criminal complaint against Ralph Mandil, an employee of an unidentified distributor of “As Seen on TV” products (we... Read More

Data breach – Are you prepared? Most are not.

According to the new survey conducted by the Ponemon Institute on behalf of Experian, companies are complacent and lack confidence when it comes to data breach preparedness. A result which I found to be most astounding given the fact that every... Read More

Selling secrets to Russia? It’s a bad idea

The headline read:  Selling Secrets to the Russians? Jason Bourne Fan arrested in spy drama of his own.  Thus implying the motivation for Gregory Allen Justice was his sick wife, a job at which he felt unappreciated and a fascination with cinematic secret... Read More

US Presidential Election 2016: The Kremlin Prefers???

The US presidential election of 2016 is entertaining the world and Russia’s Kremlin. The sad reality is one of the two major party candidates, Donald Trump (R) or Hillary Clinton (D) will be the next president of the United States... Read More

Book Review: The Slave Across the Street

I just finished reading “The Slave Across the Street” which is a first person account of how Theresa Flores, at age 15 found herself enslaved in Michigan.  Flores’ describes the circumstances surrounding her enslavement to include, how those who exploited... Read More

Fake LinkedIn profiles engaged in global espionage targeting

The BBC reports that hackers are using fake LinkedIn profiles to befriend professionals and use their information in future attacks. Source: Fake LinkedIn profiles used by hackers – BBC News The BBC article pulls from a Symantec Threat Report “Fake... Read More

Rest easy: China says U.S. OPM data breach was criminal

Reuters recently reported how the Chinese are claiming they have concluded their official investigation into the allegation that the Chinese government were responsible for the Office of Personnel Management data breach which compromised the identities of ~20 million individuals government... Read More

Your IT Security Teams Enable Business

Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential for small- to medium-size businesses (SMBs). It is imperative that security team members have a... Read More

Travel with a USG security clearance? 5 tips for a secure trip

[vc_row][vc_column width=”1/1″][text_output]Travel security for the cleared professional is incredibly important, both for personal safety as well as the protection of classified information. One of the first briefings an individual receives after being informed that they have been granted a security... Read More

The Four Vectors Targeting Intellectual Property

[vc_row][vc_column width=”1/1″][text_output]On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra’s Two-Day Knowledge Share... Read More

Prevendra’s CEO discusses cybersecurity with China TV

[vc_row][vc_column width=”1/1″][text_output]On February 13, 2015, US President Barack Obama signed “Executive Order — Promoting Private Sector Cybersecurity Information Sharing,” at the conclusion of his speech at Stanford University which hosted theWhite House Summit on Cybersecurity and Consumer Protection. The Executive... Read More