amikeliunas

About Adrian Mikeliunas

Adrian has been an IT instructor for the past ten years for MegaMind. For the past fifteen years he has been involved with the International Monetary Fund and The World Bank Group as an independent computer consultant.

You’ve Been Hacked! How to react.

2017-03-28T20:42:03-07:00

In this second part of our hacking series post we will learn WHAT TO DO NEXT when a cyber or information security incident occurs. Usually all these steps should be well documented in an Information Security Policy or an Incident Response Policy.The Carnegie Mellon University And Software Engineering Institute provides many free and detailed guides (they are [...]

You’ve Been Hacked! How to react.2017-03-28T20:42:03-07:00

Cybersecurity and Cyberwarfare

2017-03-28T20:48:10-07:00

President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” As a result, the President directed a top-to-bottom review of the Federal Government's efforts to defend our [...]

Cybersecurity and Cyberwarfare2017-03-28T20:48:10-07:00

Are Passwords Becoming Obsolete?

2017-03-28T20:51:13-07:00

We hear this question from time to time, so we might as well address it at the start of this section on Access Controls. While a password is considered similar to your ATM card PIN number since it’s something you know, the implications run a bit deeper. Many organizations, thinking to increase security for [...]

Are Passwords Becoming Obsolete?2017-03-28T20:51:13-07:00

Information Security Trends For 2013

2017-03-28T20:54:51-07:00

What's in store in Information Security for 2013? If we continue the trends of 2012, the good news is that Security will improve for larger or well-funded organizations. Here some of the main issues of Information Security that I predict for 2013... Clouds for Enterprise and Government In 2013 more businesses and government will continue the move to [...]

Information Security Trends For 20132017-03-28T20:54:51-07:00

Mobile Risk Management in the Age of 4G

2017-03-28T21:09:08-07:00

Mobile Risk Management in the Age of 4G When Marconi invented wireless back in 1896, he probably did not predict the new trend of Bring Your Own Device (BYOD) and security headaches. According to Gartner Group, the world is expected to have over 1.8 billion smartphones by 2013, more devices than personal computers! More [...]

Mobile Risk Management in the Age of 4G2017-03-28T21:09:08-07:00

Cloud Security

2017-03-28T21:10:31-07:00

Cloud Security Well, it's been a while since I've posted... Security work is always in demand! I will cover Android and PCI Assessments in future blogs, but I would like to start a short series on a hot [and hyped] topic: Cloud Computing Security... First, lets define the terms: Cloud Computing is a SERVICE provided [...]

Cloud Security2017-03-28T21:10:31-07:00

Cyber Security is not funny

2017-03-28T21:12:23-07:00

I was reading Frank Hayes Opinion column in ComputerWorld this week about some of the recent cyber security incidents, some of them affecting security companies. His theme was that that security occasionally becomes the joke. Yes, TSA gets on our nerves, the antivirus 2011 malware causes confusion among our user community and last week [...]

Cyber Security is not funny2017-03-28T21:12:23-07:00

Cyber Security and Identity Theft

2017-03-28T21:14:44-07:00

Today’s biggest cyber security concern is Identity Theft. It's the fastest growing crime in the world! Organized crime and creative malicious people will have their share of stolen goods before the end of the year.... don't make it easy on them and become a cyber victim! Cyber-thieves use all kinds of methods (hacking, tempting [...]

Cyber Security and Identity Theft2017-03-28T21:14:44-07:00

Know the Truth, Exposing Myths in Cyber Security

2017-03-28T21:16:28-07:00

We all know the cyber security is important. Having a good password is important to keep confidential information protected. We know that having an anti-virus, anti-malware and spyware application do wonders especially when you’re connected into a network or the web. Having all those applications is a good thing but we also know that [...]

Know the Truth, Exposing Myths in Cyber Security2017-03-28T21:16:28-07:00

Security from the Top!

2017-03-28T21:19:16-07:00

Megamind Security Blog, by Adrian Mikeliunas, CISSP, CISA, PCI-QSA This is an interactive “discussion board” where we can share our thoughts, rants, pet peeves or frustrations… in a fun and informal manner. Let’s discuss security, from the top! Unless your organization (whether you work for a non-profit, multi-national corporation or government agency) is “obligated” [...]

Security from the Top!2017-03-28T21:19:16-07:00
Go to Top