Is Someone Stealing Your Secret Seeds?

  A recent LA Times article on Chinese Economic Espionage prompted me to post this quick note on a sunny Friday afternoon.  Have a great weekend!   During my time at the FBI, where my team developed easy to digest Intelligence products to support Field...

I Got the Power! Insider Threats Threaten our National Infrastructure

I read the below article while enjoying a cup of morning Joe, remembering a conversation I had just a week ago. So, I thought, before the house gets crazy with kids getting ready for school, I could pass along my thoughts on energy infrastructure and SCADA. For many...

Using Chinese PCs? Not that there’s anything wrong with that….. Or is there?

I have a little bit of previous insight into the threats posed using foreign designed and built equipment, most of which can’t be shared with the general public. A few months ago, I was interviewed by the Editor of Supply Chain and Demand Executive Magazine, where I...

When Does an Employee Become Malicious?

Just read another good article that posed a question all us should be thinking about….. “How do you determine when someone becomes malicious?”  Statistics show most malicious employees didn’t join their company with the intent of stealing IP, customer data or...

Your Company and a Vulnerability Assessment

At the end of this post is a link to a really good article on the practicality of the requirements imposed on Cleared Defense Contractors to have an Insider Threat Program in-place by November 30, 2016. As the folks in article said, having a program that meets DSS’...

Channeling Security: Quortum CEO On Insider Threats

I had the pleasure of “Channeling Security” with Lorna Garey (@lornagarey), tech-writing guru at Channel Partners, recently and had a great opportunity to discuss what many aren’t thinking about when trying to stop Insider Threats. IT’S THE PEOPLE! Quortum partners...