Don Maclean

Don Maclean

Chief Cyber Security Technologist
April 17, 2017
Security Through Innovation — The Straight Scoop premium
On the heels of their big announcement, McAfee hosted the recent “Security Through Innovation” conference sponsored by DLT, where government and industry executives touted key ideas, changes of mindset that we need to start to win the cybersecurity war.  Covering everything from Cloud to private/public partnerships, to CDM and infrastructure, here are the top 3 key takeaways […]
premium
Don Maclean
Chief Cyber Security Technologist
March 2, 2017
The Password is Dead – 6 Best Practices for Multi-Factor Authentication premium
Compromised credentials are a leading cause of security breaches.  According to Verizon’s 2015 Data Breach Investigations Report, 95% of security incidents involved stealing credentials from customer devices, and using them to web applications.  So many stolen credentials are available to hackers, generally on the Dark Web, that passwords are no longer effective. Careless cloud adoption […]
premium
Don Maclean
Chief Cyber Security Technologist
February 8, 2017
Using AI to Stay One Step Ahead of Cyber Criminals  premium
The history of hacking shows that bad actors use good technologies for bad purposes.  Machine learning is no different: it has never been easier for white hats and black hats to obtain and learn the tools of the machine learning trade. Software is readily available at little or no cost, and machine learning tutorials are just as easy to […]
premium
Don Maclean
Chief Cyber Security Technologist
August 24, 2016
5 Cybersecurity Threat Trends to be Aware of in 2016 premium
Last year, we reviewed threat reports from numerous companies and organizations.  At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion.  These themes are still present a year later, but some new trends have arisen to keep them company. Ransomware is on the […]
premium
Don Maclean
Chief Cyber Security Technologist
No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats premium
I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! […]
premium
Don Maclean
Chief Cyber Security Technologist
February 16, 2016
The Past, Present and Future of Network Access Control (NAC) premium
Network Access Control (NAC), ensures proper configuration and security posture on devices trying to access a network.  It’s been around for a while, but acquired a bad reputation in its early days.  I remember looking at some NAC solutions when they first hit the market, years ago, and they were expensive, clumsy, and more likely […]
premium
Don Maclean
Chief Cyber Security Technologist
November 17, 2015
Cybersecurity 101: Privileged Account Management premium
Privileged Account Management (PAM), in both on-premise and cloud environments, is a high priority for any organization committed to security.  SANS lists it as one of their critical security controls, NIST has several control requirements associated with privileged account management, and the Cloud Security Alliance designates an entire domain to account management. To start, what […]
premium
Don Maclean
Chief Cyber Security Technologist
November 5, 2015
The Cyber Talent Drought premium
Black hat hackers make more money than white hat hackers.  A lot more.  The 2015 Symantec Internet Security Threat report states that a hacker can sell a credit card number for about $50 on the black market.  If you can steal 100,000 numbers in a few months, you stand to earn about $5 million.  This […]
premium
Don Maclean
Chief Cyber Security Technologist
November 2, 2015
The Dark Web: Dark, But Not Invisible premium
The Dark Web:  the name conjures up visions of nefarious characters doing despicable things under the cover of specialized technology that keeps them a step ahead of the law, who are hopelessly outnumbered.  Many people believe the Dark Web is like dark matter:  mysterious, undetectable, and vaster by far than our customary world. Like many […]
premium
Don Maclean
Chief Cyber Security Technologist
October 23, 2015
Cybersecurity 101: Asset Management [Video] premium
The first order of business in cybersecurity, indeed in IT management in general, is to have a reliable system inventory:  physical systems, virtual machines, software and associated configurations and vulnerabilities, and – most importantly – data.  Asset inventory is not just common sense, though, it’s the law.  The NIST 800-53 security controls require accurate tabulation […]
premium
Don Maclean
Chief Cyber Security Technologist