Press
555vCTO in the news
FiRe 2013: CTO Design Challenge: Getting to Zero: Achieving Zero Loss of Crown-Jewel IP
FiRe CTO Design Challenge: "Getting to Zero: Achieving Zero Loss of Crown-Jewel Intellectual Property - A CXO Checklist"
Judges Charging the CTO Panel: Mark Anderson, Founder and Chair, INVNT/IP; Richard Marshall, CEO, X-SES; Steven Sprague, CEO, Wave Systems, and Founding Member, INVNT/IP; and
The Challenge Team: Barry Briggs, IT Chief Architect and CTO, Microsoft; Ty Carlson, Senior Manager, Technology Program Management, Digital Products Group, Amazon; Jeff Hudson, CEO, Venafi; Pete Nicoletti, Chief Information Security Officer, Virtustream; Eric Openshaw, Vice Chairman and US Technology, Media and Telecommunications Leader, Deloitte LLP; Larry Smarr, Director, Calit2, a UC San Diego/Irvine Partnership (HQ Qualcomm Institute), UCSD; Vaclav Vincalek, President, Pacific Coast Information Systems Ltd.; and Jerry Woodall, Distinguished Professor, College of Engineering, University of California-Davis, and National Medal of Technology Laureate
Theatre patrons warned about online ticket shopping
The Queen Elizabeth Theatre is cautioning anyone searching online for tickets to the hit musical "Wicked" not to confuse official sellers with ticket brokers.
The show, based on the witches of The Wizard of Oz, opens in Vancouver this June and there are plenty of tickets available through Ticketmaster.
130 B.C. lottery web accounts compromised
B.C.'s privacy commissioner has confirmed that a breach that compromised users' account details forced the shutdown of the B.C. Lottery Corporation's new online casino PlayNow.com just hours after it was launched last week.
CBC News: Image Passwords
A B.C. security expert says alphanumeric passwords and PINs should eventually be replaced with images.
Are Your Passwords Too Weak?
"Breaking: Bill O Reilly is gay." That message was sent from the Fox News Twitter feed in January. A hacker had broken into Twitter's systems, thanks to a weak password chosen by a Twitter employee.
Could Google be tricked into talking to botnets?
Cybercriminals could start to take advantage of the popularity of search engines like Google as vehicles for relaying malicious code to botnets every time a particular keyword is searched for, said one security expert.
What's the Enterprise Risk of Social Network Outages
When a social network is taken down by a distributed denial of service (DDoS) attack, it’s somewhere between “an inconvenience and real trouble” for an enterprise, according a security expert.
Piracy, Open Source and the Shrinking Space Between
There's a rumor that honor exists among thieves, but outside of Robin Hood, no one considers them a bunch of do-gooders. Yet there may be a bright side to their shadowy work, at least in terms of enterprise software. It could very well be that they will drive the prices down.
10 things you should know about identity theft
Identity theft is often in the news, but there are a lot of misconceptions swirling around about how to best protect yourself.
While some identity thieves focus on getting your credit cards and maxing them out before you even realize they're missing, an increasing number are using other pieces of information about you -- such as online shopping account or email login credentials -- in order to steal your entire identity.
Olympic champion Phelps' website defaced in Turkish hack
Turkish hackers appear to have briefly gotten their hands on the website of Olympic record breaker Michael Phelps.
Michael Phelps can fend off all competition in the pool, but he can't swim away from vandals in cyberspace.