Articles

 

  • Questions for Executives on Cyber

    During my career, it's been my honor to have served alongside some of the most capable and talented corporate executives in the world.

  • Detecting Malicious Imitators

    Over half a century ago, the great MIT researcher Joseph Weizenbaum created a seminal computer program called ELIZA. Named after the Pygmalion character, the software was designed to interact with a human in a way that would give the impression that ELIZA was, in fact, also a living being.

  • To Tell the Truth (Bio Edition)

    For the past seven decades, Americans have enjoyed a television game show called To Tell the Truth. On the show, three contestants appear before four celebrities who try to determine which was the 'actual person' portrayed in a description that was given to the panel.

  • Real-Time Interference for Cyber

    Here are some practical recommendations from an expert on playing defense that I found today in a document on the Internet: To be sound in our defense, we must be able to adjust our defense.

  • Decentralized Authentication for a Passwordless World

    The year was 2013, and Apple had just released iPhone 5S with Touch ID, a fingerprint sensor feature that made unlocking devices as easy as touching glass. Young Brooklyn-born tech entrepreneur, George Avetisov, well-versed in eCommerce and cryptocurrencies, began to connect the dots between the threats he was seeing on the Internet each day-to-day with the exciting advances in biometrics and identity-related protections. Thus was born HYPR.

  • Fresh Cyber Solutions from a Familiar Brand

    Like many of you nerdy parents reading this, I too respected that modern rite of passage for my kids: That is, I took them on a slow procession along Route 101 in Silicon Valley in the hopes of igniting some latent entrepreneurial flame. If you haven't taken your budding tech founders there yet, I recommend it - much as a hoops coach would suggest taking the kids to see Steph Curry, in the hopes that maybe they'll start practicing their darn shooting.

  • Leading Courageously: Adopting Cutting Edge Technology & Embracing Platforms for Growth

    For CIOs around the globe, staying ahead of the accelerating technology curve remains a top priority. Between the $60 billion per year going into cloud infrastructure, the $20 billion being invested annually in business analytics, and the $50B+ dedicated towards CRM and ERP systems, it is clear that CIOs are investing heavily for the digital age.

  • Valuable Lessons From Silicon Valley

    What can Canadian technology leaders learn from Silicon Valley? A lot, according to Saqib Awan of Lightspeed Venture Partners. Lightspeed is an American venture capital firm focusing on early-stage investments in the enterprise technology and consumer space.

  • Unified Personal ID Validation

    While the U.S. First Army was blasting tank routes through the Hurtgen Forest in late 1944, Private Joseph Matuska felt enemy shrapnel hit across his entire body.

  • Rejected WSJ OpEd: Why the U.S. Needs a Cybersecurity Coordinator

    As a now thirty-three-year veteran of the cybersecurity industry, having served in a variety of senior roles supporting industry, academia, and government, I was surprised to learn that Mr. Rob Joyce was stepping down from his important role as the U.S. Cybersecurity Coordinator.

  • A New Model for Multi-Factor Authorization

    Two decades ago, I was asked to serve on a special committee to investigate how the Social Security Administration (SSA) could make better use of then-emerging public key infrastructure.