• Home
  • About
  • Specializations
  • Publications
  • Podcasts and Posts
  T Frank Downs
Picture

Online

Cyberworld​
  • Why the Latest Wi-Fi Vulnerability is and is Not a Problem

Infosecurity
  • Understand the Inherent Risk in Browser Extensions
  • Failed Incident Responses from 2017 Provide Important Case Studies
  • Understand the Inherent Risk in Browser Extensions
  • Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?
  • A Step in the Right Direction for Small Business Cybersecurity​
  • Time: An Attacker’s Best Friend
  • ​The Battle for Cybersecurity Talent Must Include Retention Emphasis
  • The Helpful Hack that Started it All
  • ​Building Cyber-Maturity Through Understanding Supply Chain Risks
  • Major Lessons to be Learned from 2020 Security Mishaps

Information Management
  • A Data Breach Can Put the Reputation of Enterprises at Stake
  • Performance-Based Cybersecurity Certifications:  Discerning Capability

CSO
  • Evolving Cyber Threats Require Evolving Training

 ​HealthIT Security
  • Addressing the Cybersecurity Skills Gap with Improved Training

DarkReading
  • WannaCry Blame Game:  Why Delayed Patching is Not the Problem

ISACA
  • A Compliance First Mentality Increases Enterprise Risk
Magazine

Infosecurity Magazine
  • Ask the Experts:  How do you Find Cybersecurity Talent (available online and in print)

Newspaper

Daily Herald
  • Connected Convenience Comes with Elevated Risk (available online and in print)

Interviews

Dark Reading
  • 8 Security Spring Cleaning Tips for the Home Office
  • Automation Exacerbates Cybersecurity Skills Gap
  • It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
​
CNBC
  • Dry your Tears:  Information Security Experts Tell You What to do After WannaCry and to Protect Your Future

ABC
  • BPCC and TESU team up to strengthen the cybersecurity workforce

Tech Target
  • ​With US ban, Huawei products put CISOs on notice

EdTech
  • Improving Connections: The Advantages of Wi-Fi 6 for Online Learning

​
White Papers

ISACA
  • ISACA 2017 State of Cybersecurity
  • ISACA 2019 State of Cybersecurity, Part I

Books

Cybersecurity Program Development for Business:  The Essential Planning Guide (contributor)

Navigation

Home
About
Publications

Contact

© COPYRIGHT 2015. ALL RIGHTS RESERVED.
  • Home
  • About
  • Specializations
  • Publications
  • Podcasts and Posts