Posts tagged with: christopher burgess

The Four Vectors Targeting Intellectual Property

[vc_row][vc_column width=”1/1″][text_output]On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra’s Two-Day Knowledge Share... Read More

Prevendra’s CEO discusses cybersecurity with China TV

[vc_row][vc_column width=”1/1″][text_output]On February 13, 2015, US President Barack Obama signed “Executive Order — Promoting Private Sector Cybersecurity Information Sharing,” at the conclusion of his speech at Stanford University which hosted theWhite House Summit on Cybersecurity and Consumer Protection. The Executive... Read More

VOA – “Careto” – ‘Mask’ malware – a cyber espionage operation

‘Mask” Malware Called ‘Most Advanced’ Cyber-espionage Operation – (February 13, 2014): Prevendra’s CEO, Christopher Burgess is interviewed by VOA about  the Advanced Persistent Threat Malware – “Careto.” WASHINGTON — Researchers at the Internet security firm Kaspersky Lab say they have uncovered... Read More

Prevendra’s CEO on the BBC discussing the NSA reforms

BBC’s “World have your say” program discusses President Obama’s speech and his recommendations for National Security Agency (NSA) reforms. On 17 January 2014, Prevendra’s CEO, Christopher Burgess participated in the BBC’s World Service “World have your say” radio program. The... Read More

Homeland Security Today: No Vacancy – The daunting challenge of hotel security

In the December 2013/January 2014 issue of Homeland Security Today magazine, “No Vacancy – The daunting challenge of hotel security” discusses hotel security from the hotel’s perspective as well as that of those who might be lodging with the hotels.  The author,... Read More

VOA: China hit by ‘Largest ever’ hack attack

China hit by ‘Largest ever’ hack attack – (August 26, 2013):  Large parts of China’s Internet went dark this past weekend as the country came under what the Beijing government is calling the “largest ever” hack attack on Chinese sites.... Read More

Nation States’ Espionage and Counterespionage – An overview of the Economic Espionage landscape of 2007

  Though we are mid-way through 2013, I refer to a study I wrote in 2008 as it contains many data points applicable today.  In 2008 I published via CSO Online a study on the Economic Espionage landscape of 2007,... Read More

China’s intellectual property advance

Prevendra’s Christopher Burgess posted a piece on China in the Huffington Post – China’s Military – Here we are!, which noted how the People’s Republic of China (PRC) has been eating the West’s intellectual property lunch for the past 25+... Read More

Defining the causes of a data breach

I recently crafted a piece for Huffington Post, What’s a data breach, in which I defined the vagaries of the different types of causes of a data breach.  While I list the different types, I welcome opinion on others, and... Read More

Big Data Security is a must have

“Secure the data!” That’s the claxon call which every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to... Read More

VOA – Powerful Cyber-Attack Slows Internet

Power Cyber-Attack Slows Internet – (March 27, 2013) “:  What some are calling the biggest cyber-attack ever is reportedly slowing down Internet connections around the world. At the root of the problem is an apparent dispute between two organizations —... Read More

VOA – US Cyber Command to Take Offensive

US Cyber Command to Take Offensive – (March 15, 2013) “The U.S. Department of Defense has made a rare acknowledgement that it is developing offensive cyber capabilities. In testimony before the Senate Armed Services Committee this past week, Gen. Keith... Read More

Security – Who is responsible?

Do you view your security posture in the office as more or less important in comparison to your residence? And how does that compare to the personal security profile that you exercise for you and your family? Who should be... Read More

VOA – Hacking: Not just China

Hacking: Not Just China  – (February 21, 2013) “Computer hacking by the Chinese has been causing a stir in recent weeks, but experts warn that focusing too much on Beijing could open the door to cyber spies from other countries... Read More

El Pais – Propaganda a golpe de tuit

Propaganda a golpe de tuit – (Febrero 3, 2013) “En agosto de 2011, el portavoz del Ejército israelí, Avi Benayahu, anunció que buscaban alistar combatientes que supieran utilizar con pericia “los nuevos medios”. La razón era simple: “Las redes sociales... Read More

Bringing the Social Media #Revolution to Health Care (Mayo Clinic)

On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities... Read More

Victims of Bullying need to know they can survive

The suicide death of 15 year-old Amanda Todd was a preventable and tragic event. Her mother, Carol Todd, has asked that her daughter's death be used as a means to prevent the death of another child. Our children... Read More

Freedom is seldom free

Freedom is seldom free - served to remind all of us why we were serving our nation abroad. It also served to remind us that our freedoms, such as religious freedom and freedom of speech, are not universally enjoyed.... Read More

Children as a commodity – Human Trafficking & Sex Trafficking

Those who are unfamiliar with the terms "sex trafficking" or "human trafficking" I hope will envision children being bought and sold, for the use of others - child slavery would also be an apropos term. This isn't isolated to... Read More

Unintended Consequences – Time for a paradigm shift

On 2 November, I gave a talk, "Unintended Consequences" at Gnomedex. I spoke to the need to recognize that "always-on" isn't necessarily always good. I went on to describe the train-wrecks which occur when technology which is... Read More
12