Cyber Chief Magazine: Key strategies on your path towards data privacy Download Now
Ken is a technology author, blogger, columnist, podcaster, videographer, and practicing technologist who writes on a variety of topics that include open source software, Linux, Windows, Mac, UNIX, databases, virtualization, security, and consumerization. Ken is Security+ and Cybersecurity First Responder certified. Ken's current passion is making movies, mostly in the Film Noir genre.
IT Operations
9 July, 2015

Hacker Team Hacked: A Strong Case for Stronger Passwords

It’s unfortunate when anyone is the victim of a hack or data compromise, but put the moniker ‘hacker’ or ‘security expert’ in your name and you’re sure to identify yourself as a target....
IT Operations
22 June, 2015

Handling the Threat of Internal Breaches

Every time you listen to the news, read a newspaper, or scan online news, you learn of another security breach that involves consumer’s personal information. Consumers assume that breaches occur by...
Security & Compliance
17 June, 2015

10 Security Tips for the US Government

The recent Office of Personnel Management (OPM) hack reveals that the US Government needs to significantly “up” its security game. Upping the game means that government security staff needs to...
Show more articles