14 Posts

Mike Elgan

I write a popular weekly column for Computerworld, contribute news analysis pieces for Fast Company, and also write special features, columns and think pieces for a variety of publications reaching millions of readers each month. Since the early 90s, I've worked as chief editor for WINDOWS Magazine and a variety of other tech publications, most of which I founded, co-founded or launched. I've also consulted for publishing companies (including Ziff Davis) and Silicon Valley startups on the development of innovative new content and media. I've moderated or spoken at hundreds of technology panels and events; appeared as a guest on BBC, CNN, CNBC, FOX News among others; and have been quoted by The New York Times, Wall Street Journal, NPR and hundreds of other publications and media organizations. I served for two years as TWiT's News Director and the anchored the daily show Tech News Today.

Written By Mike Elgan

Why You Should Constantly Enrich Security Culture Throughout Your Organization

Here's what you need to know about organizational security culture — and how to plan for and inspire a better one.

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.

Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.

Are You Really Covered by Your Cyber Insurance?

Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.

Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

It’s Time to Dispel These Dangerous Password Security Myths

Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.

How to Prepare for the Coming 5G Security Threats

5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.

How to Stop Mobile Apps That Steal

One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.