Cybersecurity is an Organized Behavior [Podcast] – with Kevin McDonald

COO and CISO of Alvaka Networks, Kevin McDonald, sits down with Brian Sherman of IoTSSA for a very candid conversation on building a successful cybersecurity offering. He offers some great advice in this episode, such as using law enforcement as [...]

Cybersecurity is an Organized Behavior [Podcast] – with Kevin McDonald2018-11-29T14:23:48+00:00

Alvaka’s COO/CISO Kevin B. McDonald to Present at 1903 Solutions’ 8th Annual Technology Showcase

IRVINE, Calif., October 11, 2018 (Newswire.com) - At their Annual Technology Showcase, 1903 Solutions is continuing an eight-year tradition of bringing together some of the best-of-the-best in technology. For this year’s event at the Hilton La Jolla Torrey Pines, 1903 [...]

Alvaka’s COO/CISO Kevin B. McDonald to Present at 1903 Solutions’ 8th Annual Technology Showcase2018-10-11T15:35:06+00:00

Pentagon’s lack of cyber authority leaves data at risk…

Lawmakers on the Senate Armed Forces Committee claim that the Department of Defense is not taking strong enough action against defense contractors in regards to protecting Controlled Unclassified Information (CUI), which is putting all of that data at risk. Given [...]

Pentagon’s lack of cyber authority leaves data at risk…2018-09-04T12:43:12+00:00

Six of the Most Dreaded IT Projects

Written by Dan Tynan (Writer, Editor, and Consultant). Originally posted on CIO.com on June 25, 2018. Alvaka Networks CEO, Oli Thordarson, and CTO, Unnar Gardarsson, contribute to this discussion on what projects IT professionals dread the most. The projects that most IT [...]

Six of the Most Dreaded IT Projects2018-06-29T12:22:09+00:00

The Questions to Ask When Hiring an IT Security Consultant

by Jessica Thiefels, VP of Community Management for PolySwarm. Learn what questions to ask when hiring an IT security consultant, including insight from Alvaka Networks CEO, Oli Thordarson. If you can’t afford an in-house IT security team, you have to look [...]

The Questions to Ask When Hiring an IT Security Consultant2018-06-29T15:22:40+00:00

Beware the ‘thought police:’ The dangers of human and AI integration

Kevin McDonald discusses AI integration and possible negative consequences. Humans have always strived to become smarter, faster and more creative through the use of tools. Starting with the basic calculator and advancing to the amazing computing devices we use today, [...]

Beware the ‘thought police:’ The dangers of human and AI integration2018-07-02T10:05:20+00:00

Imran Awan case shows lax security controls for Congressional IT staff

By Kevin McDonald Investigations into the conduct of the IT staff of the House of Representatives raised alarms. Kevin McDonald explains what we can learn from the case of Imran Awan. Those who operate with high-level system access, [...]

Imran Awan case shows lax security controls for Congressional IT staff2018-06-29T14:46:29+00:00

Private sector’s national cybersecurity strategy contributions lacking

By Kevin McDonald The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity laws. Private companies should be responsible for [...]

Private sector’s national cybersecurity strategy contributions lacking2018-10-31T14:09:49+00:00

How information technology advisory groups can benefit organizations

By Kevin McDonald In today's cyber environment, many public safety organizations struggle to advance their technology and maintain security. Many departments would love to seek out efficiencies through advanced, cost-saving technology. They know they must improve their cybersecurity and operating efficiency. [...]

How information technology advisory groups can benefit organizations2018-10-31T14:15:12+00:00

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile SecurityIn its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as well [...]

CRN’s story on the CIA Wikileaks leak2017-05-25T15:17:57+00:00
Load More Posts