On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success.
Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical […]
Everyone has been talking about Pokémon Go, the new app featuring the augmented reality game. But the hype is more than just talk:
Nintendo stock nearly doubled from the popularity of the app (though it later […]
For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated […]
Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information.
In fact, it’s been reported that LinkedIn is a recent […]
This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working […]
We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important […]
Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which […]
Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network. Most […]
Group Policy is a core component of Active Directory (AD) used to centrally manage an organizations’ security, application, and user settings. Group Policy settings are divided into user and computer sections, and a policy can […]