16 Posts

Mike Elgan

I write a popular weekly column for Computerworld, contribute news analysis pieces for Fast Company, and also write special features, columns and think pieces for a variety of publications reaching millions of readers each month. Since the early 90s, I've worked as chief editor for WINDOWS Magazine and a variety of other tech publications, most of which I founded, co-founded or launched. I've also consulted for publishing companies (including Ziff Davis) and Silicon Valley startups on the development of innovative new content and media. I've moderated or spoken at hundreds of technology panels and events; appeared as a guest on BBC, CNN, CNBC, FOX News among others; and have been quoted by The New York Times, Wall Street Journal, NPR and hundreds of other publications and media organizations. I served for two years as TWiT's News Director and the anchored the daily show Tech News Today.

Written By Mike Elgan

Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

The workforce is becoming more "invisible." But far too many organizations still aren't taking this into consideration during security planning.

Why Every Employee in Your Organization Should Learn Social Engineering Vocabulary

When it comes to social engineering training, make sure every employee learns the names of specific attacks.

Why You Should Constantly Enrich Security Culture Throughout Your Organization

Here's what you need to know about organizational security culture — and how to plan for and inspire a better one.

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.

Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.

Are You Really Covered by Your Cyber Insurance?

Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.

Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

It’s Time to Dispel These Dangerous Password Security Myths

Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.