Skip to content
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Logo-cyber with three tag words 4000w
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in

Welcome to v057 : Happy Cybersecurity Awareness Month!

  • October 14, 2024

News: Hackers Force Chrome Users To Hand Over Google Passwords. Here’s How

Newly published research has revealed how threat actors are using a devious new technique to force Chrome browser users to reveal their Google account passwords out of nothing more than sheer frustration. The credential-stealing campaign, which uses malware called StealC, locks the user’s browser in kiosk mode while blocking both the F11 and ESC keys to prevent them from escaping out of this full-screen mode.

 

News: Cloudflare outage cuts off access to websites in some regions

A rolling Cloudflare outage is impacting access to web sites worldwide, including BleepingComputer, with sites working in some regions and not others.

 

News: Ransomware gangs now abuse Microsoft Azure tool for data theft

Ransomware gangs like BianLian and Rhysida increasingly use Microsoft’s Azure Storage Explorer and AzCopy to steal data from breached networks and store it in Azure Blob storage.

 

Cyber Savvy AI Antics

Happy Cybersecurity Awareness Month!

In October’s chill, the spooks arise,
But not just ghouls with glowing eyes.
It’s Cybersecurity Month, hooray!
The hackers and phishers come out to play.

Beware the emails that seem too sweet,
Promising riches—a tricky feat!
That “Click Here Now” may look so fine,
But it hides a scam in disguise online.

Passwords strong, like a fortress wall,
Keep your data safe from the cyber brawl.
No “1234” or “Password1,”
That’s hacker bait—it’s not much fun.

Enable two-factor, don’t be shy,
With one more step, you’ll block that spy.
Your data’s precious, just like gold,
Guard it well—be brave and bold!

Don’t trust the Wi-Fi at your café,
That open net is a hacker’s buffet.
Keep your VPN locked nice and tight,
And surf the web without the fright.

So this October, don’t just scream,
At ghosts or goblins in your dream.
Stay cyber-savvy—be alert,
And wear that firewall like a T-shirt!

Cybercrime’s real, it’s no fun and games,
But with awareness, you’ll dodge the flames.
Stay secure and smart, protect what’s yours,
And you’ll outlast the cyber bores!

 

News: Chrome Introduces One-Time Permissions and Enhanced Safety Check for Safer Browsing

Google has announced that it’s rolling out a new set of features to its Chrome browser that gives users more control over their data when surfing the internet and protects them against online threats.

 

News: Healthcare’s Diagnosis is Critical: The Cure is Cybersecurity Hygiene

Cybersecurity in healthcare has never been more urgent. As the most vulnerable industry and largest target for cybercriminals, healthcare is facing an increasing wave of cyberattacks. When a hospital’s systems are held hostage by ransomware, it’s not just data at risk — it’s the care of patients who depend on life-saving treatments.

 

News: QR Phishing Scams Gain Motorized Momentum in UK

Criminal actors are finding their niche in utilizing QR phishing codes, otherwise known as “quishing,” to victimize unsuspecting tourists in Europe and beyond.

 

News: Contractor Software Targeted via Microsoft SQL Server Loophole

By accessing the MSSQL, threat actors gain admin-level access to the application, allowing them to automate their attacks.

 

News: Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN Feature

Google on Thursday unveiled a Password Manager PIN to let Chrome web users sync their passkeys across Windows, macOS, Linux, ChromeOS, and Android devices.

 

News: The Microsoft 365 Backup Game Just Changed: Ransomware Recovery Revolutionized

In today’s hyper-connected digital world, the importance of robust data protection is undeniable. For businesses of all sizes, the need to safeguard critical information has moved from a secondary IT concern to a boardroom-level issue. This heightened urgency is driven by the increasing frequency and complexity of cyberattacks, particularly ransomware, which have the potential to cripple operations, cause catastrophic financial losses, and in some cases, irreparably damage a company’s reputation.

 

News: Why ‘Never Expire’ Passwords Can Be a Risky Decision

Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your password’ notification – and they like it even less when the new passwords they create are rejected by their organization’s password policy. IT teams share the pain, with resetting passwords via service desk tickets and support calls being an everyday burden. Despite this, it’s commonly accepted that all passwords should expire after a set period of time.

 

News: New Microsoft Windows Warning—Fake CAPTCHAs Attacking PCs

A new warning as we head into the weekend, that a “global attack” is now targeting Windows users in multiple countries around the world. The campaign is stupidly simple, but it hammers home the risk for the hundreds of millions of Windows 10 users heading for a world without security updates a year from now.

 

News: Microsoft’s security culture reboot includes cyber governance council, all-staff trainings

The tech giant launched its Secure Future Initiative after a string of major security breakdowns.

 

News: Telegram Agrees to Share User Data With Authorities for Criminal Investigations

In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone numbers to authorities in response to valid legal requests in an attempt to rein in criminal activity on the platform.

 

News: CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes

CrowdStrike says it has revamped several testing, validation, and update rollout processes to prevent a repeat of the July BSOD incident.

 

News: Hackers deploy AI-written malware in targeted attacks

In an email campaign targeting French users, researchers discovered malicious code believed to have been created with the help of generative artificial intelligence services to deliver the AsyncRAT malware.

 

Vulnerability Vortex

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions.

 

Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws

Today is Microsoft’s October 2024 Patch Tuesday, which includes security updates for 118 flaws, including five publicly disclosed zero-days, two of which are actively exploited.

 

Adobe Releases Security Updates for Multiple Products

Adobe released security updates to address multiple vulnerabilities in Adobe software. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.

 

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

 

Firefox Zero-Day Under Attack: Update Your Browser Immediately

Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild.

 

 

Read also

Welcome to V068: They let the hackers in through the ‘cloud’ – whatever that is.

Read newsletter

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

Read newsletter

Welcome to v066 : Jibber Jabber Cyberwocky

Read newsletter

Welcome to v065 : Just when you thought it couldn’t get crazier…

Read newsletter

Welcome to v064: A cybersecurity pro and a business executive walk into a bar….

Read newsletter

Welcome to v063: I can remember all my passwords!

Read newsletter

Welcome to v062 : Roses are red, violets are blue, cyber-hackers are waiting for you

Read newsletter

Welcome to v061 : New Year’s Resolution: Strengthen Cybersecurity, Protect Missions.

Read newsletter

Welcome to v060 : Dashing through the net, in a cloud-based CMS

Read newsletter

Welcome to v059 : It’s Cyber Budget Time

Read newsletter

Welcome to v058 : Cyber Fright Night

Read newsletter

Welcome to v056 : What is your Neurocyberpathology?

Read newsletter

Welcome to v055: It’s Time to Get Cyber-tastic!

Read newsletter

Welcome to v054 : How to Phish an Association Exec

Read newsletter

Welcome to v053 : Hot Out of the Oven: American Phish Pie

Read newsletter

Welcome to v052 : Quantum Toaster Breaches: Coffee Appoints New CIO

Read newsletter

Welcome to v051: Be thankful you’re not Crowdstrike!

Read newsletter

Welcome to v050 : We’re at v050 and kicking cyber-ass!!!

Read newsletter

Welcome to v049 : Watch Over Your Tech

Read newsletter

Welcome to v048 : BEC is DOA

Read newsletter

Welcome to v047 : Insurance Future: Coverage Linked to Cyber Hygiene

Read newsletter

Welcome to v046 : One Phish, Two Phish, Red Team, Blue Team

Read newsletter

Welcome to v045 : Quantum Humor: Relatively Fun, Universally Secure

Read newsletter

Welcome to v044 : Tongue Twisting Today’s Top Tech Terms

Read newsletter

Welcome to v043 : Where Firewalls Whisper and Passwords Giggle

Read newsletter

Welcome to v042 : Swap Suits for Codes and Be Heroes

Read newsletter

Welcome to v041 : Sweet Security Insights, Slice by Slice

Read newsletter

Welcome to v040 : Staff slip, skip strict security steps

Read newsletter

Welcome to v039: Rockin’ Cyber News

Read newsletter

v038: Choose Your CyberNews

Read newsletter

v037: Cybercrime is as Cybercrime Does

Read newsletter

v036: News You Can’t Refuse

Read newsletter

v035: Have Some Views of Cyber-News

Read newsletter

v034: The Double-Edged Sword in 2024 Cybersecurity Landscape

Read newsletter

v033: Cyber News to Use so You Don’t Lose

Read newsletter

v032: Cybercrime all the time

Read newsletter

V031: Cyber News for Chews

Read newsletter

V030: Cybercrime is a Tasty Wave

Read newsletter
About Us
businessman developing strategic plans, evaluating technology

Developing cybersecurity plans, evaluating and implementing technology, building effective software, and executing strategic initiatives.

Let’s Socialize

Popular Post

Welcome to V068: They let the hackers in through the ‘cloud’ – whatever that is.

April 23, 2025

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

April 3, 2025
About

Reduce cybersecurity risk, maintain compliance, develop strategic plans, and create custom software.

Services
  • Fractional CISO – Cybersecurity Leadership
  • Fractional CTO – Application Development Leadership
  • Automation
  • Ransomware Cost Estimator
Quick Links
  • Latest Publications
  • Testimonials
  • Customer Use Cases
Logo-cyber with three tag words 4000w

Do you want a free sketch for your homepage? Visit Weblify.se

Linkedin-in

Why you need a vCIO?

While CEOs and presidents grapple with the complexities of business, marketplace, industry, strategy, and their board and stakeholders, they are left with little time or inclination to deal with the details of the incredibly dynamic technology landscape. Keeping one’s eye on the myriad of technology changes and how they can and will affect the business takes a specialized, dedicated, and experienced professional. That is exactly the role of the virtual CIO or CTO.
Download

20 Years of CIO Experience

Tracks trends, market direction and customer needs to plan the future of technology.  Recruits high performing team members and develops their skills by providing decision-making ownership and collaborative engagement.  Able to initiate culture change, lead by example, and get buy-in at all levels.  Known for facilitating energizing brainstorming sessions that generate actionable insights and create new revenue opportunities.

In 2000, Brian was introduced to the exhibitions and events industry when he joined 3rd Millennium Communications as Manager of Software Development for a Virtual Tradeshow Product.  That company was acquired by Galaxy Information Services and through additional acquisitions later became Experient.

As CIO of Experient, Brian oversaw the replacement and upgrade of every piece of legacy proprietary systems that supported the registration, housing, and lead retrieval services.  He also oversaw the transition from a paper-based and manual business operations to an entirely online and mobile app-based model.  Brian oversaw the strategy and operations of the Experient data center including their recent adoption and migration to cloud-based hosting to enhance availability, reliability, scalability, and recoverability.

Brian led the product development strategy and spearheaded several product concepts including eventBit™ which was granted a US patent in 2019 (Patent Number: US 10,311,267 B2).  He was also instrumental in the evolution of lead retrieval products from hardware-based units to smart phone-based mobile app technology.

Brian oversaw the cyber-security position for Experient including compliance to the Payment Card Industry Data Security Standard (PCI DSS), SSAE-18 SOC 1 Type II, and internal corporate security standards audits. Security scope included a 400-server data center, 700 end user devices, and credit card data environment, and a data center holding thousands of databases of customer data. Under Brian’s leadership, Experient successfully met or exceeded requirements for PCI since its introduction in 2005.

Brian’s business philosophy is rooted in a belief in the power of high performing teams, the necessity of self-disruption, the focus on the client’s perspective, the criticality of speed of change, and the utility of lean and agile development and operational processes.

Brian has the honor of being the first technology professional to participate as a director on the Board of Directors for the International Association of Exhibitions and Events® (IAEE). Organized in 1928 as the National Association of Exposition Managers to represent the interests of trade show and exposition managers, the International Association of Exhibitions and Events® is the leading association for the global exhibition industry. Today IAEE represents over 12,000 individuals in 50 countries who conduct and support exhibitions around the world. Being a data-centric leader, Brian is also proud to serve on the board of CEIR, the Center for Exhibition Industry Research.

Brian also believes that in today’s competitive employee market, the most successful companies must find ways to create enjoyable and engaged workplace environments. No stranger to performance, Brian was frequently seen on stage in front of the Experient organization delivering educational messages (such as not clicking on links within phishing emails) or just poking fun at his peers within the leadership team through music.

Brian is a Tennessee Volunteer at heart and his blood runs deep orange due to his undergraduate studies at the University of Tennessee, Knoxville where he received his Bachelors of Science in Electrical Engineering with Honors.  He also earned a Masters of Science in Technology Management from the University of Maryland Global Campus.  His personal passions include his wife and two sons, music, and fitness.  He is a 30-year veteran of live music performance, a published musical play composer, and a recording studio engineer and producer.  When he’s not in the studio, you’ll find him out on his bike climbing the local hills.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.I agree