From the Spring 2019 Issue

The Role of Voice Authentication in Cybersecurity

Author(s):

Justin Petitt, Chief Information Officer, LG-TEK

Larry Letow, President, COO, LG-TEK

Voice Authentication

Everyone loves to talk about the future of cybersecurity. However, most do not realize that in doing so, they’re using one of the most secure tools available to facilitate that conversation, the human voice. The voice connects us person-to-person, and when used as a component in enterprise, can securely connect us to our data around … Read more

From the Spring 2017 Issue

Security Through Inclusion

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Larry Letow, President, COO, LG-TEK

It’s not the number of people in your security department, but the number of departments into security, that will make you secure. Creating a secure business is not about replacing part of your business with security functions, it’s about integrating security into business operations, as with any other business function. It’s certainly not about believing … Read more

From the Spring 2016 Issue

Can Employee Behavior Indicate an Insider Threat?

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

While technology can play an important role in identifying an insider threat, it is equally important not to overlook behavioral patterns. Malicious employees often provide warning signs as they move from the idea of acting ‘not in accordance with established policies’ to outright data theft. These signs often take the form of changes in attitude … Read more

From the Fall 2015 Issue

REVIEWING LESSONS LEARNED FROM THE INSIDER THREAT

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

As the United States observes National Cybersecurity Awareness Month, we are reminded that organizations of all varieties are at risk for cyber-attacks. Even the largest operations are not immune to the serious ramifications that come with security breaches. In order to operate safely and effectively, organizations need to be vigilant about their cybersecurity practices. While … Read more

From the Summer 2015 Issue

Playing Both Sides of the Field: An Offensive and Defensive Approach to Cybersecurity

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

In our mobile and ever-changing cyber world, traditional static security solutions are simply not enough to defend against the complex, multi-dimensional threats to digital security. While securing network borders is unquestionably key in maintaining a protected system, all too often organizations ignore the serious threat insiders pose to cybersecurity. Through negligent or malicious means, insiders … Read more

From the Winter 2015 Issue

Welcome to Security in the 21st Century— Monitoring Employee Behavior

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

“All human beings have three lives: public, private, and secret.”  — Gabriel García Márquez, Gabriel García Márquez: a Life  “Experience should teach us to be most on our guard to protect liberty when the government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The … Read more

From the Summer 2014 Issue

It’s What’s Inside That Counts – The War From Within

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

“Tis not so deep as a well nor so wide as a church-door, but ‘tis enough, ‘twill suffice” — (Romeo and Juliet by William Shakespeare, Act III, Scene 1)  It is no surprise that with the continuing advancements in data mobility, increasing demands of regulatory compliance, and sharing amongst the global community, that securing our nations … Read more