Michael Markulec

technology executive, cyber-security guru, politician, rugby player, deadhead, brewer, former army officer, crossfitter, and hard-drinking calypso poet.

Image of word Password

2 min read

Breaking the Chain: The Perils of Password Reuse

Passwords are the keys to our digital lives; the convenience of using a single password for multiple accounts can be tempting. After all, who wants to remember a laundry list of unique, complex passwords for every online service they use? But the...

Read More

2 min read

Fortifying Your Digital Fortress: A Guide to Cybersecurity Awareness

Cybersecurity is more critical than ever in a world where technology permeates every aspect of our lives. The importance of online safety cannot be...

Read More

2 min read

How Auto Dealerships Can Navigate the Perilous Road of Cybersecurity

Within the world today, the automotive industry faces a growing and alarming threat—cybersecurity risks. Auto dealerships, in particular, have been...

Read More

2 min read

The Growing Threat of Cyberattacks on Healthcare: Lessons from the Recent Incident

In recent years, the healthcare industry has increasingly become a target for cyberattacks, and a recent incident involving a California-based health...

Read More

2 min read

Cybersecurity Challenges in the Insurance Industry

The insurance business faces many cyber dangers in today's digital environment. The sector's substantial financial assets and valuable data make it...

Read More

2 min read

Securing the Future: Cybersecurity Imperatives for the Manufacturing Sector

Cyberattacks pose a serious and ongoing threat to the manufacturing sector in today's rapidly changing technological environment. This sector's...

Read More
Construction Worker on Cybersapce background

2 min read

Building Strong Defenses: Navigating Cybersecurity Challenges in the Construction Sector

Following the global coronavirus pandemic, there has been a sharp shift toward digital transformation across all businesses. The construction sector,...

Read More
Identity and Access Management

2 min read

Identity and Access Management (IAM) in Security Strategies

Identity and access management (IAM) has become a key security component in the constantly changing cyber and information security world. What was...

Read More

2 min read

Safeguarding against Business Email Compromise (BEC)

While large corporations often make the headlines, small and medium-sized organizations increasingly become targets of sophisticated attacks, with...

Read More
Weaponized AI

1 min read

The Emerging Threat of Weaponized Generative AI: Safeguarding Security

In the wake of AI's rapid advancements, weaponized generative AI has surfaced as a significant concern. Highlighted in a recent Forbes article titled...

Read More