Articles

 

  • Decentralized Authentication for a Passwordless World

    The year was 2013, and Apple had just released iPhone 5S with Touch ID, a fingerprint sensor feature that made unlocking devices as easy as touching glass. Young Brooklyn-born tech entrepreneur, George Avetisov, well-versed in eCommerce and cryptocurrencies, began to connect the dots between the threats he was seeing on the Internet each day-to-day with the exciting advances in biometrics and identity-related protections. Thus was born HYPR.

  • Fresh Cyber Solutions from a Familiar Brand

    Like many of you nerdy parents reading this, I too respected that modern rite of passage for my kids: That is, I took them on a slow procession along Route 101 in Silicon Valley in the hopes of igniting some latent entrepreneurial flame. If you haven't taken your budding tech founders there yet, I recommend it - much as a hoops coach would suggest taking the kids to see Steph Curry, in the hopes that maybe they'll start practicing their darn shooting.

  • Leading Courageously: Adopting Cutting Edge Technology & Embracing Platforms for Growth

    For CIOs around the globe, staying ahead of the accelerating technology curve remains a top priority. Between the $60 billion per year going into cloud infrastructure, the $20 billion being invested annually in business analytics, and the $50B+ dedicated towards CRM and ERP systems, it is clear that CIOs are investing heavily for the digital age.

  • Valuable Lessons From Silicon Valley

    What can Canadian technology leaders learn from Silicon Valley? A lot, according to Saqib Awan of Lightspeed Venture Partners. Lightspeed is an American venture capital firm focusing on early-stage investments in the enterprise technology and consumer space.

  • Unified Personal ID Validation

    While the U.S. First Army was blasting tank routes through the Hurtgen Forest in late 1944, Private Joseph Matuska felt enemy shrapnel hit across his entire body.

  • Rejected WSJ OpEd: Why the U.S. Needs a Cybersecurity Coordinator

    As a now thirty-three-year veteran of the cybersecurity industry, having served in a variety of senior roles supporting industry, academia, and government, I was surprised to learn that Mr. Rob Joyce was stepping down from his important role as the U.S. Cybersecurity Coordinator.

  • A New Model for Multi-Factor Authorization

    Two decades ago, I was asked to serve on a special committee to investigate how the Social Security Administration (SSA) could make better use of then-emerging public key infrastructure.

  • Tools for the Cyber Hunter

    Just weeks after my first textbook on computer security was published in 1994, a far superior book emerged from two of my colleagues.

  • Advanced Cloud Security for Enterprise

    This past year, I had the great opportunity to work with so many wonderful entrepreneurs who were transformed into large industrialists before my very eyes.