Periodi

Welcome! Please comment and leave me a note telling me what you like and what you'd like to see more of. Sign up to my RSS Feed!
  1. CSO Magazine, “Where PCI DSS Falls Short and How to Make it Better”, April 2009 – Writer.
    • Translated to Mandarin Chinese as “PCI DSS Needs Solutions”  “(PCI DSS的不足以及解决方案)”, May 2009, ChinaByte.
    • Mandarin Chinese translation repeated by Top Point China and CTO CIO China.
    • Repeated by CIO Magazine USA, ComputerWorld, InfoWorld, The Industry Standard, IT World, CIO Magazine Germany, Linux World, NetworkWorld, IDG Norway.
  2. Windows NT Magazine, Duke Communications International. Technical Editor.
  3. Tech Watch, “Security Pros Want Strong Policy for Virtualization”, June 2009 – Quoted Expert.
  4. ComputerWorld,Sizing up Security Services”, November 27, 2000 – Featured Interviewee
  5. The Wall Street Journal, “Iran Pro-Regime Voices Multiply Online”, July 3, 2009 – Featured Expert.
  6. Cyber Security Blog, "The Strategy to Secure the Federal CyberSpace” April 2009 – Author.
  7. Hírszerzo Sokat Jelent, “(Meaningful Intelligence)”, In Hungarian, “Dramatic Developments On the Iranian Web” “(Drámai Trendváltozás az Iráni Weben)“, July 2009 – Quoted Expert.
  8. CSO Magazine, When Bad Things Happen to Good Companies”, May 2003 – Interviewee.
    • Repeated by CIO Magazine Australia.
  9. CNN.com, “Colleges Respond to Wave of Internet Infections”, September 5, 2003 – Interviewee.
    • Repeated by The Associated Press, Wired Magazine as “Colleges Crack Down on Viruses” – September 6, 2003."
    • Repeated by Red Orbit as “Colleges Move to Thwart Internet Viruses”.
    • Translated to Korean as “Colleges React to Attack of Internet Attacks” “(대학 인터넷 감염의 물결에 대응)”, CNN Korea.
    • Translated to Hungarian as “(Az Oktatási Intézmények Yálasza Az Internetes Fertöz ési Hullámra)”, Virus Hirado.
  10. Campus Technology, “Campuses Expending Wireless Coverage”, October 1, 2004 – Interviewee.
  11. NetworkWorld Fusion, “Temple Getting Tough”, October 20, 2003 – Featured Interviewee.
  12. CSO Online, “Mission Impossible? A Plan to Secure the Federal Cyberspace)”, June 2009 – Author.
    • Repeated by ComputerWorld USA, CIO Magazine USA, IT World, The Industry Standard, CIO Magazine Germany, InfoWorld, ComputerWorld Norway, Webwereld Netherlands.
  13. CSO Magazine, “What Should WH Cybersecurity Coordinator's Job Description Look Like?)”, July 2009 – Author.
    • Repeated by ComputerWorld USA, CIO Magazine USA, IT World, The Industry Standard, CIO Magazine Germany, InfoWorld, ComputerWorld Norway.
    • Analyzed by The Cyber Security Institute, in an article titled “Observations on the WH Cybersecurity Coordinator Post and Silverstone’s Analysis”, July 2009 – Quoted Expert.
  14. Beyond The Imagination, Brazil, “PCI DSS Defects and How to Improve It” “(Onde o PCI-DSS Tem Defeitos e Como Melhorá-lo)", 30 April 2009 – Featured Expert.
  15. Syllabus Magazine,Managing the Network Security Challenge”, January 2004 – Writer.
  16. ComputerWorld, “Two IT Chiefs Tell Their Security Tales”, March 25 2004 – Featured Interviewee.
  17. CSO Magazine,Cloud Security: Danger (and Opportunity) Ahead” — May 2009, Writer.
    • Repeated by CIO Magazine Australia, ComputerWorld Norway, InfoWorld, CSO Magazine Australia, IT Business Canada, IT World, Linux World, ComputerWorld USA, The Industry Standard.
    • Translated to Mandarin Chinese as “Cloud Computing Problems” “(云计算问题)”, CIO CTO China.
    • Chinese translation repeated by ChinaByte, China.com, June 2009.
    • Chinese translation repeated by CCW, DoSaaS, Techweb China, July 2009.
    • Translated to Mandarin Chinese again as “Veteran of the Israeli Ministry of Defense Looks at Security Issues of Cloud Computing” “(老兵以色列国防部期待在安全问题的云计算)”, Manufacturing China.
    • Translated to Slovak as “Learn The Dangers” “(Jeho Nebezpečí)”, Crypto-World.
    • Translated to Korean as “Cloud Computing: Everything and the Kitchen Sink" “(클라우드 컴퓨팅 : 모두와 부엌의 싱크대)”, Google Inside Korea.
    • Repeated by Computer News Middle East, as “How to Avoid the Pitfalls of Cloud Security”.
    • Translated to Czech as “Cloud Computing: Learn the Dangers” “(Cloud Computing – Jeho Nebezpečí)”.
  18. Syllabus Magazine, “8 Spots for Tightening Security on Campus”, March 2004 – Featured Interviewee.
  19. University Business, “How Secure Are You?”, March 2004 – Cover Page Article Interviewee.
  20. Converge Online, “Temple University Moves Beyond Reactive IT Security”, April 2004 – Feature Article Writer.
  21. ChannelWeb, “Colleges Toughen Rules to Prevent Internet Infections”, September 2003 – Featured Interviewee.
  22. ZDNET, “Temple University Offers a Lesson in Information Security”, July 2005 – Featured Expert.
    • Repeated by ZDNET Germany, Tech Republic, ZDNET UK, ZDNET Asia.
  23. ComputerWorld, “Sasser: an IT 'Annoyance'”, June 2, 2004 – Featured Interviewee.
    • Repeated by ComputerWorld Canada.
  24. ComputerWorld, “I'm Fixing a Hole”, June 4, 2004 – Featured Interviewee.
    • Repeated by CSO Magazine Australia.
  25. CSO Magazine, “Crash Course”, August 2004 – Featured Case Study and Interviewee.
  26. EduCAUSE Quarterly, “Toward a Virus-Free Campus”, Volume 27, Number 3, 2004 — Feature Article Writer.
  27. The Chronicle of Higher Education, “Microsoft Fixes Problems in Windows XP but Creates Others for Colleges”, September 2004 – Quoted Expert.
  28. TechLINKS Magazine, “Student Awareness Strengthens Security”, October 2004 – Writer.
  29. The Centered Librarian, “Cloud Computing Kool-Aid: Blazing New Trails?”, May 2009 – Quoted Expert.
    • Repeated by CIO Magazine Australia.
  30. CSO Magazine, “Google FAIL and the Fog Over Cloud Security”, May 2009 – Quoted Expert.
    • Translated to Mandarin Chinese as “Google Cloud Computing Problem” “(Google云计算的困扰_安全子站_云计算)”, ChinaByte.
    • Translated to Japanese as “The Agony of Cloud Computing” “(クラウドコンピューティングは、苦しみの)” , Japan Life.
    • Repeated by CIO Magazine Australia, ComputerWorld Hong Kong, CSO Magazine Australia, ComputerWorld Norway, IT World, The Industry Standard, CIO Magazine USA.
  31. College Planning & Management, “Student Awareness Strengthens IT Security”, November 2004 – Writer.
  32. CSO Online, “Cybersecurity Crossroads: Will White House Czar Choose the Right Path?”, May 28 – 2009 – Quoted Expert.
    • Repeated by ComputerWorld USA, CIO Magazine USA, ComputerWorld Norway.
  33. eWeek, “Merger Mania: Symantec Aims High with Veritas Deal”, December 20/27, 2004 – Feature Article Interviewee.
  34. Campus Technology, “Authentication: The Power of Who” – Interviewee.
  35. eWeek, Symantec Eyes One-Stop Shopping”, January 3, 2005 – Interviewee.
    • Translated to Japanese as “Symantec Considering the Value of a Single Security Model” “(Symantecのセキュリティモデルは、単一の値を考慮)”, eWeek Japan.
  36. Security Technology & Design, “Ask the Experts: IP-Addressable Video Technology”, January 2005 – Featured Expert.
  37. BizEd Magazine, “Knights in Cyber Armor”, January / February 2005 – Interviewee.
  38. Risk Mitigation Executive, “The Ostrich Syndrome”, April 2005 – Contributing Editor.
  39. Security Technology & Design , “Security Executive Profile”, June 2005 – Profiled Executive
  40. Risk Mitigation Executive, “Scorecards and Dashboards in IT Risk Solutions”, extended feature, June-August 2005 – Author.
  41. Edge of the Cloud, “Opportunity & Dangers Ahead for Cloud Computing”, June 2009 – Quoted Expert.
  42. CSO Magazine, “Undercover”, 2009 – Author.
  43. SC Magazine, “Iranian Election Protesters Use Twitter to Recruit Hackers”, June 2009 – Quoted Expert.
    • Repeated by SC Magazine United Kingdom, Bay Ledger News Zone, Zimbio.
    • Translated to Polish as “Cyberwar Page” “(Cyberwojna domowa)”, Arcabit.
  44. Maariv, “(The Nightly Paper)”, in Hebrew, “Freedom Fighters: The Israeli Expert and the Iranian Bloggers” “(לוחמי חופש: המומחה הישראלי והבלוגרים האיראניים)”, June 2009 – Quoted Expert.
  45. The Register, “Congressman Calls for 'Cyber-Reprisals' Against North Korea”, July 2009 – Quoted Expert.
  46. Security Netherlands, in Dutch, “Cyber Attacks [on] U.S. and South Korea Work of Amateurs” “(Cyberaanvallen VS en Zuid-Korea Werk van Amateurs)”, July 2009 – Quoted Expert.
  47. Mainly Media, “Iran and the Internet: A Conversation With Ariel Silverstone”, June 2009 – Interviewee.
    • Repeated by My Urban Report as “How Iran & the Internet Have Changed the News Game”.
  48. Cyber Security Institute, “PCI Security [an] Associated Press Investigation”, June 26, 2009 – Quoted Expert.
  49. CSO Online, “5 Steps to Secure a New PC”, June 29, 2009 – Quoted Expert.
    • Repeated by CSO Magazine Australia, Computerworld Hong Kong.
  50. CSO Magazine, "201 CMR 17: A New Tea Party", July 30, 2009 – Author.
  51. IEEE Security & Privacy Magazine, "The Economics of Click Fraud", August 2009 – Technical Reviewer
    • New version, January 2010.
  52. CSO Online, "The Biggest Hole" (praising the value of users), August 2009 – Writer.
  53. CIO Online, "Face It! – the Risk of Biometrics", August 2009 Writer.
  54. CSO Online, "The Maine Event: The Good, The Bad and The Unenforceable" (a discussion of Maine's new privacy law), August 2009 – Writer. 
  55. SC Magazine, “Civilians Cyberattacked Georgia in 2008 War”, August 2009 – Quoted Expert.
    • Repeated by Bay Area News Zone, SC Magazine Australia
  56. CSO Magazine, “Cloud Security: Time to Smoke Another One?”, August 2009 Referenced Expert.
    • Repeated by ComputerWorld Norway, CIO Magazine Australia, ComputerWorld Hong Kong, CSO Magazine Australia, InfoWorld, IT World, The Industry Standard, CIO Magazine USA, CIO Magazine Germany
  57. CSO Magazine, “Where Defense in Depth Falls Short”, October 2009 – Author.
    • Repeated by TechWorld as "The Problem with Defence in Depth"
  58. Large Enterprise Insight, “Windows 7 Security”, October 23, 2009 Quoted Expert.
  59. Security Netherlands, “Experts Divided Over Cyber War Threat”, “(Experts Verdeeld Over Dreiging Cyberoorlog)”, November 2009 – Quoted Expert.
  60. CSO Magazine, “Clear Metrics for Cloud Security? Yes, Seriously”, November 2009 – Author.
    • Repeated by CIO Magazine USA, The Industry Standard, ComputerWorld Norway, InfoWorld, ComputerWorld USA, CIO Magazine Germany, ComputerWorld Hong Kong.
  61. IEEE Security & Privacy, “The Economics of Click Fraud”, January 2010 – Technical Reviewer
  62. Maariv, “(The Nightly Paper)”, in Hebrew, “Taking Charge: The Need for A Nationally Coordinated Cyber Defense” “(לוקחים פיקוד: הצורך לתאום לאומי בהגנת מחשבים)”, June 2010 – Author.
  63. Hakin9, in Polish, "Cyberwar", "(Cyberwojna)", July 2010 – Quoted Expert.
  64. National Institute of Science and Technology, Computer Security Division, "NIST Interim Requirement(IR) 7628: Smart Grid Cyber Security Strategy and Requirements", August 2010 – Contributor.
  65. Virginia Commonwealth University, Information Management 661, Capstone paper, Cloud Computing Security”, Spring 2011 – Quoted Expert.
  66. International Information Security Systems Certification Consortium (ISC)², “Security in The Skies: Cloud Computing Security Concerns, Threats, and Controls”, April 2011 – Quoted Expert.
  67. DatacenterDynamics,”Having to be Right 100% of The Time”, June 2011 – Interviewed Expert.
  68. FutureChallenges,Internet Access. A Human Right”,June 2011 – Interviewed Expert.
  69. CIO Magazine Special Edition – Your Strategic Guide to Security: The New Threat Landscape.OMG! You Need A Social Media Policy – Now”, June 2011 – Interviewed Expert.
    • Repeated by CSO Magazine, Computerworld, InforWorld, ITworld, Network World
  70. CIO Magazine Special Edition – Your Strategic Guide to Security: The New Threat Landscape.Mobile Madness: Blend of Practical Policies and Tools”, June 2011 – Interviewed Expert.
    • Repeated by CSO Magazine, Computerworld, InforWorld, ITworld, Network World

 

 

Permalink