Cyber Defense

Houses Unanimously Approves Email Privacy Act – Senate Expected To Do Same

WASHINGTON DC - Who says Congress can’t work together? Well   certainly so when it comes to email privacy. On Wednesday the House of Representatives voted 419-0 to approve the Email Privacy Act, an update to a 30-year old law privacy advocates say is long overdue. The bill essentially fills a loophole in the 1986

By |2016-04-28T19:21:38-04:00April 28th, 2016|Cyber Defense, Featured, Politics|

Secret Code For Smart Devices To Keep Black Hats Out Of Internet Of Things

SAN FRANCISCO - Everyone knows that all these smart devices plugging into today’s homes - part of the exploding Internet of Things - also provide black hats with a golden opportunity to hack computer networks. On Wednesday, Samsung and Thales e-Security announced a new system for smart devices that manufacturers can plug into a refrigerator

By |2016-04-28T18:43:20-04:00April 28th, 2016|Cyber Defense|

FBI Maintains Silence On How It Cracked Terrorist iPhone – Israeli Company Suspected

WASHINGTON DC - The FBI is maintaining its silence about a hack that gave it access to data on a terrorist's iPhone, although earlier reports claimed an Israeli company masterminded the exploit. As expected, the agency released a statement Wednesday, reported by CNET.Com, arguing that it doesn't know enough about the hacking method to submit

By |2016-04-28T15:36:34-04:00April 28th, 2016|Cyber Defense, Politics|

May ISACA Detroit Chapter Meeting May 12: Insider Threats, IT Risk

TROY - Insider threats and IT Risk will be the topics discussed at the May ISACA Detroit Chapter meeting May 12 at Michigan State University Management Education Center. Pre-Dinner Topic: Keeping Insider Threats at Bay: Key Steps to Building a Successful Audit Program. Pre Dinner Speaker: Doug Copley CISA, CISM, CISSP, CIPP/US, CIPT After-Dinner Topic:

By |2016-04-28T14:32:01-04:00April 28th, 2016|Cyber Defense|

M2 TechCast: Deception Or The Art Of Fooling Or Entrapping A Cyber Attacker

FERNDALE - Deception has long been practiced by the military to trick an enemy into collecting bad intelligence. But deception also is the class of techniques used to fool cyber attackers. It can be fake servers and endpoints (honey pots), instrumented to detect activity. It can be poisoned data that can include "beacons."  If someone

By |2016-04-27T13:03:59-04:00April 27th, 2016|Cyber Defense, M2 TechCast, Podcasts|

M2 TechCast: Everything You Need To Know To Protect Your Business From Ransomeware

FERNDALE - Cybersecurity experts Dan Lohrmann and Richard Stiennon again update the M2 TechCast audience on the top issues facing businesses and consumers in the rough and tumble world where cyber attacks are becoming the norm. In the first segment, Lohrmann and Stiennon continue to examine the plague of ransomware - one of the latest

By |2016-04-27T13:00:34-04:00April 27th, 2016|Cyber Defense, M2 TechCast, Podcasts|

M2 TechCast: Merit Network Celebrates Golden Anniversary In May

FERNDALE - Merit Network President Joe Sawasky provides a preview of the Merit 50th Anniversary Party May 11-12 at the Eagle Crest Hotel in Ypsilanti. Merit Network was created in 1966 by the University of Michigan, Michigan State University and Wayne State University to connect all public universities and nearly 400 other education and non-profit

By |2016-04-27T12:38:36-04:00April 27th, 2016|Cyber Defense, M2 TechCast, Podcasts|

Duo Security Gets $2.5 Million Grant From Strategic Fund To Expand Operations – Signs Lease On Allmendinger Building

ANN ARBOR - Duo Security was awarded a $2.5 million grant Tuesday from the Michigan Strategic Fund, money that will be used to fund the cybersecurity company’s expansion and create up to 300 jobs over the next three years.  Duo Security, with locations in Michigan, California, London, and Austin, plans to expand its existing operations

By |2016-04-29T15:27:02-04:00April 26th, 2016|Cyber Defense, Politics|

Merit Seeking Colleges, Non-Profits In Southeast Michigan Looking To Create Cyber Range Hubs

ANN ARBOR - Public schools, community colleges, public universities, and non-profit organizations in Southeast Michigan interested in cybersecurity training or economic development are encouraged to respond to a new request for proposals issued Tuesday by Merit Network. The deadline to respond is May 15. Merit, a sub-recipient of the Advance Michigan Defense Collaborative grant, is

By |2016-04-26T13:13:02-04:00April 26th, 2016|Cyber Defense, Featured|

Trivalent Group Expands Its Managed Services Footprint To Greater Lansing

EAST LANSING - Managed services provider Trivalent Group, already a major player on the West side of Michigan, added central Michigan to its footprint on Wednesday when President and CEO Larry Andrus announced the acquisition of KI Technology Group. Terms were not announced. But Andrus said the acquisition of the East Lansing managed services company,

By |2016-04-21T11:06:49-04:00April 21st, 2016|Cyber Defense, News|