Once More into the Breach

By |November 23rd, 2016|


You may have heard the big news. It was announced in September that 500 million Yahoo accounts had been hacked, resulting in one of the most catastrophic data breaches in U.S. history.


What was compromised?


Yahoo’s statement on […]

Highlights from Congressman Michael McCaul’s Speech: Corporate Governance and Risk Management

By |November 1st, 2016|

On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success.

One […]

Houston Cybersecurity Event: Corporate Governance and Risk Management Breakfast

By |October 17th, 2016|

Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical […]

The big phish: Don’t get hooked by ransomware or B.E.C.

By |July 11th, 2016|

For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated […]

Six ways to prevent or limit the impact of a cyberattack

By |May 31st, 2016|

Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information.

In fact, it’s been reported that LinkedIn is a recent […]

Highlights from The Future of Leadership Luncheon

By |April 21st, 2016|

This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working […]

Do these three things today to secure your company data

By |April 13th, 2016|

We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important […]

Monitoring Windows/AD Authentications and Logon Activity

By |January 14th, 2016|

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which […]

Inactive Active Directory User Accounts

By |January 14th, 2016|

Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network.  Most […]