Z Trek: The Alan Zeichick Weblog

, ,

Cybersecurity has a diversity problem with women — and many opportunities

MacKenzie Brown has nailed the problem — and has good ideas for the solution. As she points out in her three part blog series, “The Unicorn Extinction” (links in a moment): Overall, [only] 25% of women hold occupations in technology…
, ,

Tell your customers about your data breaches!

Did they tell their customers that data was stolen? No, not right away. When AA — a large automobile club and insurer in the United Kingdom — was hacked in April, the company was completely mum for months, in part because it didn’t believe…

The Acting Director of the FBI is not a scammer

This is an amusing spam scam, if only because it’s so poorly written. Mr. Andrew McCabe, the Acting Director of the FBI, is certainly not behind this scam. Also, the FBI doesn’t send emails using Cyber Internet Services Private Ltd. in Pakistan,…
, ,

End of an era: BZ Media’s SD Times to be acquired by D2 Emerge LLC

It’s almost painful to see an issue of SD Times without my name printed in the masthead. From Editor-in-Chief to Editorial Director to Founding Editor to… nothing. However, it’s all good! My company, BZ Media, is selling our flagship…

Get the time-wasting monkey off your back

Here are a few excerpts from one of the most important articles on leadership ever published. “Management Time: Who’s Got the Monkey?,” from Harvard Business Review in 1974, equally applies to the business and non-profit worlds. The…
,

Flat tire adventures with a Prius: Jacks and donuts spares

"The wheels on the Prius go flop flop flop...." Sunday’s travels in our trusty 2005 Toyota Prius were marred only by a flat tire. I wish to share two hard-earned bits of wisdom with other Prius owners, and potentially with owners of…
,

Watch out for threatening emails from Anonymous or Lizard Squad

The Federal Bureau of Investigation is warning about potential attacks from a hacking group called Lizard Squad. This information, released today, was labeled “TLP:Green” by the FBI and CERT, which means that it shouldn’t be publicly shared…

With Petya, Malware Means Cyberwar

Petya may indicate the start of real cyberwar. This week’s newest ransomware attack is technically similar to the WannaCry (aka WannaCrypt) cyberattack. However, the intent, and the results, are quite different – one wants to make money,…
, ,

Agylytyx is a silly name, let’s make fun of it

I am unapologetically mocking this company’s name. Agylytyx emailed me this press release today, and only the name captured my attention. Plus, their obvious love of the ™ symbol — even people they quote use the ™. Amazing! Beyond…

Sorry, spammers, but James Comey is no longer FBI Director

This is a generally unremarkable spam message except for the obvious. James Comey was fired as the Director of the FBI on May 9. That makes it unlikely that Mr. Comey can deliver the promised $1.2 million. Bummer. The missing spaces are just…
, ,

Virtual Reality, Augmented Reality, Real Reality

Virtual reality and augmented reality are the darlings of the tech industry. Seemingly every company is interested, even though one of the most interested AR products, Google Glass, crashed and burned a few years ago. What's the difference? …
, ,

Just say No to Flash, CNN

CNN didn’t get the memo. After all the progress that’s been made to eliminate the requirement for using Adobe's Flash player by so many streaming-media websites, CNNgo still requires the problematic plug-in, as you can see by the screen…
, ,

Varjo offers a new type of high-def VR/AR display tuned to the user’s eye motions

The folks at Varjo think they’re made a breakthrough in how goggles for virtual reality and augmented reality work. They are onto something. Most VR/AR goggles have two displays, one for each eye, and they strive to drive those displays…
,

The good and bad of press relations – a view from four editors

What do PR people do right? What do they do wrong? Khali Henderson, a senior partner in BuzzTheory Strategies, recently interviewed me (and a few other technology editors) about “Things Editors Hate (and Like) About Your Press Relations.” She…
,

Lordy, I hope there are tapes

I received this awesome tech spam message today from LaserVault. (It's spam because it went to my company’s info@ address). There’s only one thought: “Lordy, I hope there are backup tapes.” Free White Paper: Is A Tape-Related Data…
, ,

Running old software? It’s bad, unsafe, and insecure. Replace!

The WannaCry (WannaCrypt) malware attack spread through unpatched old software. Old software is the bane of the tech industry. Software vendors hate old software for many reasons. One, of course, is that the old software has vulnerabilities…
, , ,

Business advice for chief information security officers (CISOs)

An organization’s Chief Information Security Officer’s job isn’t ones and zeros. It’s not about unmasking cybercriminals. It’s about reducing risk for the organization, for enabling executives and line-of-business managers to innovate…
,

Streamlining the cybersecurity insurance application process

Have you ever suffered through the application process for cybersecurity insurance? You know that “suffered” is the right word because of a triple whammy. First, the general risk factors involved in cybersecurity are constantly changing.…
,

Dragonfly, butterfly, bee

Everyone loves bugs — at least, everyone loves beautiful bugs. Right? Here are a few photographed in Phoenix over the past couple of days. The desert here is full of life, from insects to birds to reptiles to plants. Sure, the temperatures…
, , ,

A phone that takes pictures? Smartphone cameras turn 20 years old

Twenty years ago, my friend Philippe Kahn introduced the first camera-phone. You may know Philippe as the founder of Borland, and as an entrepreneur who has started many companies, and who has accomplished many things. He’s also a sailor,…
,

Hacking can kill — and cyberattacks can lead to warfare

Hacking can kill. To take the most obvious example, take ransomware. One might argue that hackers demanding about US$300 (£230) to unlock some files is simply petty crime – unless those files were crucial to hospitals. If doctors can’t…
,

It’s suddenly harder to do tech business in China

Doing business in China has always been a rollercoaster. For Internet businesses, the ride just became more scary. The Chinese government has rolled out new cybersecurity laws, which begin affecting foreign companies today, June 1, 2017.…

Stop contacting the other lying spammers!

A little reverse psychology, eh? Don’t worry, trying to get this faux fortune will only cost you $450 from the spammers… or maybe more. Interesting that the name of the contact, Mr.James Richard, has the same spacing throughout, which is…
, ,

How to design software that gracefully handles poor Internet connectivity

"Someone is waiting just for you / Spinnin’ wheel, spinnin’ true." Those lyrics to a 1969 song by Blood, Sweat & Tears could also describe 2017 enterprise apps that time-out or fail because of dropped or poor connectivity. Wheels…
,

Malware in movie subtitles are coming to a mobile near you

Movie subtitles — those are the latest attack vector for malware. According to Check Point Software, by crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any…
, ,

My article on digital watermarks cited in a U.S. government paper

March 2003: The U.S. International Trade Commission released a 32-page paper called, “Protecting U.S. Intellectual Property Rights and the Challenge of Digital Piracy.” The authors, Christopher Johnson and Daniel J. Walworth, cited an article…
,

Female entrepreneurs are treated differently than male entrepreneurs

According to a depressing story in Harvard Business Review, venture capitalists consider female entrepreneurs to be quite different than males. The perceived difference is not good. According to the May 17, 2017, story, “We Recorded VCs’…