Chuck Brooks | AlienVault Blogs
Chuck Brooks

Chuck Brooks

Chuck Brooks is President of Brooks Consulting International. He is also Vice Chairman of CompTIA’s New and Emerging Technologies Committee and on the advisory board of several companies and organizations. Brooks served at the Department of Homeland Security as the first director of legislative affairs for the Science and Technology Directorate. He also spent six years on Capitol Hill as a senior adviser to the late Sen. Arlen Specter (Pa.). He has an MA from the University of Chicago and a BA from DePauw University. Please follow him on Twitter @ChuckDBrooks and on LinkedIn.

December 13, 2017 | Chuck Brooks

Emerging Technologies and the Cyber Threat Landscape

Cybersecurity is at a tipping point, the sheer volume of breaches, attacks, and threats has become overwhelming.  Juniper Research, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. About 1.9 billion data records got exposed in the 918 data breaches that occurred in the first…

July 5, 2017 | Chuck Brooks

Identity Theft, the Not So Hidden Scourge

Per a recent study released by Javelin Strategy & Research, identity fraud hit a record high in 2016 targeting 15.4 Million U.S. Victims and with hacker/fraudsters netting around $16 billion dollars. Those findings are not so shocking, as breaches from companies, government, and untold individual accounts are becoming an unfortunate norm.The reason for the increased rate of identity fraud is…

Get the latest security news in your inbox.

Subscribe via Email

April 5, 2017 | Chuck Brooks

Defining and Addressing the Growing Cyber Insider Threat

The Cyber Insider Threat is one of the most difficult challenges for companies, organizations, and countries. It is often difficult to discover, defend and remediate because such threats can involve a combination of human behavioral elements and hardware and software technologies. Many of the threat actors are tech-savvy and are becoming increasingly sophisticated in their methods of infiltration. What Is…

January 17, 2017 | Chuck Brooks

The Priority of the Government/Industry Cybersecurity Partnership

The change in the cyber risk environment coinciding with a heightened need for procurement of new technologies and services has created a new paradigm for a cybersecurity partnership between government and industry. The prioritization of that special partnership appears to be in the immediate plans for the new Trump Administration.The appointment of former NYC Mayor Rudy Giuliani as a…

December 12, 2016 | Chuck Brooks

Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise

Escalating cyber-attacks on corporations, infrastructure, and organizations have created an environment of uncertainty and, in some cases, panic over the implications of data breaches. Despite the trends of greater frequency, sophistication, efficacy and liabilities associated with incursions, the industry has been mostly unprepared and slow to act.Tools for hackers have become more readily available, and cyber-criminal gangs are becoming…

October 20, 2016 | Chuck Brooks

The Emerging Trend of Gamification in Cybersecurity

For many years the defense and intelligence communities have relied upon a concept called gamification to test concepts, strategies, and potential outcomes in various scenarios via computer simulation. They have found that gamification heightens interest of the players involved and serves as a stimulus for creativity and interchange of ideas which is vital for keeping an edge. As computers have…

October 6, 2016 | Chuck Brooks

Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape

Healthcare cybersecurity is in a state of transformation. As medical care becomes more networked and interconnected via computers and devices, the digital landscape of health administrators, hospitals, and patients, has become increasingly vulnerable.The cybersecurity healthcare landscape has many facets. These include the information security networks of medical facilities and hospitals, medical equipment and devices, and protection of the privacy…

August 23, 2016 | Chuck Brooks

Technology Foraging for Cybersecurity Solutions

Technology foraging, or searching for smart ideas and technologies, is a key element of research and development both in the public and private sectors. It serves as a basis for discoveries of new products, applications, and processes brought to the marketplace. There are many hidden treasures yet to be discovered, commercialized, licensed and integrated into technology solutions. Foraging can impact…

July 13, 2016 | Chuck Brooks

Embracing Global Public/Private Cybersecurity Alliances

In an increasingly connected world, threats of cyber-attacks are growing in complexity and volume. As we have discovered in the past few years, much of the global critical infrastructure is using aging legacy systems and is largely unprotected against sophisticated breaches. The world’s critical infrastructure, that includes the health, financial, commerce, and transportation sectors, needs better cybersecurity protection. …

June 15, 2016 | Chuck Brooks

The Rise of the Chief Data Officer

The volume of data available to and collected by the public and private sectors has exponentially grown in each subsequent year. Industry has reacted to the rapid proliferation of information being generated and shared across verticals and with customers. Data has become such an essential component to many companies that a new strategic role of Chief Data Officer (CDO) has…

June 9, 2016 | Chuck Brooks

Digital Convergence and Cybersecurity

We live in a world of digital convergence. Our banking accounts, credit cards, and financial daily activities are interconnected. Our interpersonal communications are more often than not via smartphones at social media apps. Our records, including personal medical histories, are all digitized and shared. We now conduct our daily lives in a world of algorithms.Because of this expanding interconnectivity…

Watch a Demo ›