Jeff BardinPCWorld

Since 1982 Jeff has worked in leadership positions organizations such as General Electric, Lockheed Martin, and Marriott International.  He also served as the Security Manager for the Centers for Medicare and Medicaid (LMIT), Chief Security Officer for Hanover Insurance, the Chief Information Security Officer for Investors Bank & Trust, and the Director, Office of Risk Management for EMC. Jeff is currently Chief Intelligence Strategist for Treadstone 71. In 2007 he was awarded the RSA Conference award for Excellence in the Field of Security Practices. The Bardin-led security team from Hanover Insurance also won the 2007 SC Magazine Award – Best Security Team competing against such organizations as Barclays Global and the Department of State. Jeff sits on the Board of Directors, Boston Infragard; Content Raven, Wisegate, was a founding member of the Cloud Security Alliance; is a member of the Cyber Security Forum Initiative, the RSA Conference Submission Selection Committee and formerly on the Customer Advisory Board for Chosen Security. Jeff published The Illusion of Due Diligence in 2010 and was a co-author for the Computer and Information Security Handbook, Understanding Computers, and has published articles for magazines such as The Intelligencer, CSO, and SC Magazine. Jeff served in the USAF as a cryptologic linguist, and in the USANG as an officer.  He has BA in Special Studies - Middle East Studies & Arabic Language from Trinity College as well as a MS in Information Assurance from Norwich University.  He is also a professor of masters programs in cyber intelligence, counterintelligence, cybercrime and cyber terrorism at Utica College. Jeff also holds the CISSP, CISM, C|CISO and NSA-IAM certifications. Infantry Officer Basic Course - Armor Officer Basic Course - DLI FLC ~ Airborne School - Military Intelligence Captains Career Course - Counterintelligence (CI)/Human Intelligence ( HUMINT) Management Course - Source Operations Course ( SOC ) ~ Joint Interrogation Management Course - Joint HUMINT Officer Course Licensed Skydiver, Level D ~ Registered SCUBA Diver - Bronze Star Medal ~ Joint Service Commendation Medal ~ Army Commendation Medal - Air Force Commendation Medal - National Defense Service Medal ~ Afghanistan Campaign Medal ~ Iraq Campaign Medal - Global War On Terrorism ~ Lebanon Defense Service Medal ~ Army Service Ribbon - Parachutist Badge ~ Expert Infantryman Badge technorati tags: cyber intelligence cyber counterintelligence OSINT del.icio.us tags: cyber intelligence cyber counterintelligence OSINT icerocket tags: cyber intelligence cyber counterintelligence OSINT keotag tags: cyber intelligence cyber counterintelligence OSINT

Staged cyber schemes may help shore up 'weakest link'

Mock phishing attacks might be the best way to teach users to avoid them in the real world.

Update your Samsung Galaxy S III now or you might lose all of your data

A simple 11-digit code can be used by attackers to remotely trigger a full factory reset on the Samsung Galaxy S III smartphone.

197 reasons you should upgrade to iOS 6 immediately

Forget about the 200 new features and updates Apple talks about, there are 197 flaws and vulnerabilities fixed in iOS 6.

Will you be more secure if you abandon Internet Explorer?

Switching browsers will protect you from the current Internet Explorer zero-day exploits, but it's not a silver bullet security solution.

Your PC may come with malware pre-installed

Microsoft researchers have discovered computer systems infected with botnet malware before they're even taken out of the box.

FBI rolling out high-tech 'Big Brother' monitoring system

The FBI's Next Generation Identification (NGI) system is raising concerns among some privacy advocates.

Android users are prime target for malware

A new report finds malware threats are at a four-year high, and mobile platforms in particular are a hot target--especially Android.

Do Authentication Questions Really Protect You?

Authentication questions are designed to prove you're really you, but with so much information shared online they can be trivial for attackers to bypass.

Protect Your Dropbox Data with Two-Factor Authentication

Dropbox is stepping up security for its cloud-based data storage service by providing the option of requiring two-factor authentication to log in.

What You Should Know About the iPhone SMS Spoof Attack

A flaw in iPhone security could allow spoofed SMS text messages, but there are some tricks you can use to detect and avoid them.

25 Essential Android Business Apps

Mobile devices handle business tasks that go far beyond e-mail. Here's a selection covering communications, presentations, number-crunching, and other office apps.

A Sinister New Breed of Malware is Growing

New threats like Shamoon, Flame, and Stuxnet represent a concerning evolution for malware attacks.

Users Are Still the Weakest Link

Most security experts agree that there is no security in the world that can guard against human error.

on techhive.com

Amazon Prime Instant Video Grows Again, Still No Match for Netflix

Amazon has announced a licensing agreement with Warner Bros. TV.

on techhive.com

BBC to Test Ultra High-Definition TV at London 2012 Olympics

BBC and NHK will use the world's only Super Hi-Vision equipment to film a variety of Olympic sports and broadcast them to the public.

on techhive.com