Rstiennon

About Richard Stiennon

This author has not yet filled in any details.
So far Richard Stiennon has created 15 blog entries.

Latest Business Cyber Hacks With Richard Stiennon

BIRMINGHAM - Cybersecurity expert Richard Stiennon joins MITechTV to update all the cybersecurity threats, and hacks in the business world. Richard is the author of the Security Yearbook series published by Wiley that are sold on Amazon. In the interview, Richard discusses the following: Grocery giant Ahold Delhaize’s US operations disrupted by cyberattack https://www.cybersecuritydive.com/news/grocery-ahold-delhaize-cyberattack/732562/ City

By |2024-11-23T11:34:38-05:00November 22nd, 2024|Cyber Defense, mitechtv|

Stiennon Updates Latest Cyber Threats Including Ransomware Attack In Baltimore

ROYAL OAK - Richard Stiennon, a cybersecurity expert and author of There Will Be Cyber War, joins M2 Techcast to discuss all the latest cyber threats including the ransomware attack that crippled the government networks in the City of Baltimore. https://soundcloud.com/mike-brennan-841872555/e172-cybersecurity-richard-stiennon

By |2024-04-04T14:16:14-04:00June 7th, 2019|Cyber Defense, M2 TechCast, Podcasts|

Cybersecurity Track At IoT Tech Connect: How To Keep Hackers Out of IoT

ROYAL OAK - Richard Stiennon, publisher of IT-Harvest and a recognized cybersecurity expert, also will moderate a panel discussion April 29 at the Michigan Science Center that will focus on how to keep hackers out of driverless vehicles and IoT (Internet of Things) devices. Richard Stiennon Buy tickets to IoT Tech Connect at https://iottechconnect.com/events/iot-tech-connect-2019/ Toyota

By |2024-04-04T14:16:37-04:00April 19th, 2019|Cyber Defense, M2 TechCast, Podcasts|

Cybersecurity Expert Tells Hacker Horror Stories Gleaned From RSA Conference

ROYAL OAK - RSA’s Security Conference last week provided new cyber attack horror stories for Richard Stiennon to tell listeners of M2 Techcast. For instance, hackers gamed a blockchain contest and stole $10 million. Richard also is now a best selling author with his new book, Secure Cloud Transformation. Hear all about it on this

By |2019-03-15T05:52:19-04:00March 14th, 2019|Cyber Defense, M2 TechCast, Podcasts|

State Of Cybersecurity: Stiennon Talks Russian Hackers, Embedded Spy Chips, Like War

ROYAL OAK – Cybersecurity expert Richard Stiennon returns on M2 TechCast to update the latest cybersecurity threats. Richard Stiennon  In this segment, Richard discusses: “LikeWar,” a new book by Peter Singer and Emerson Brooking The Department of Justice indictment of Russian GRU (military intelligence) hackers The Bloomberg report about embedded chips in Super Micro boards. 

By |2018-10-16T18:51:21-04:00October 16th, 2018|Cyber Defense, M2 TechCast, Podcasts|

If You Do Business In Europe, European Union General Data Protection Regs Apply

ROYAL OAK - If you have a business that sells to clients in the European Union, you’re going to have to deal with a new regulation that starts May 25 requiring companies to protect the personal data and information of EU residents. Richard Stiennon, a cybersecurity expert from IT-Harvest in Birmingham, explains what this new

By |2018-05-22T19:45:10-04:00May 20th, 2018|Cyber Defense, M2 TechCast, Podcasts|

IoT Cybersecurity Track At IoT TechConnect Focuses On Auto, Manufacturing, Medical Devices

ROYAL OAK - The Internet of Things will radically change the way we interact with our environment but it also offers many targets of opportunity for cyber criminals to hack computer networks that serve as the backbone of IoT.  At IoT TechConnect on April 4 at the Troy Marriott, three panel discussions will focus on

By |2018-03-13T19:42:25-04:00March 13th, 2018|Cyber Defense, M2 TechCast, Podcasts|

Latest Cybersecurity Threats Can Steal Your Password And Give Hackers Access To Your Computer Network

ROYAL OAK - Cybersecurity expert Richard Stiennon joined us on M2 TechCast to scare the heck out of us on what the bad folks are doing in 2018 to hack your computer network. The two latest villains are Meltdown and Spector, which exploit fundamental flaws in the way memory chips are designed. As it turns

By |2018-01-24T15:25:35-05:00January 24th, 2018|Cyber Defense, Featured, M2 TechCast, Podcasts|

Cyber Pearl Harbor Versus The Real Pearl Harbor

BIRMINGHAM - December 7, is a good day to re-think the implications of a “cyber Pearl Harbor.”  Leon Panetta, famously used the term in 2011, when it seemed like all of our generals had become cyber experts overnight. "The potential for the next Pearl Harbor could very well be a cyber-attack," the CIA Director testified before the

By |2017-12-14T20:15:34-05:00December 14th, 2017|Cyber Defense, Guest Columns|