Home Wes O'Donnell

Wes O'Donnell

A veteran of both the US Army and US Air Force, Professor Wes O’Donnell is a highly sought after presenter who has recently spoken at TEDx on Data Visualization and the US Air Force Academy on Leadership. He is noted for his fascinating, informative, dynamic and entertaining keynotes. Wes educates companies and government organizations on a number of topics ranging from emerging technology and big data visualization to veteran’s issues and leadership. But Wes’ best talks tend to center around his personal journey from poverty to distinguished entrepreneur and professor; a truly inspiring journey.

Automated Cybersecurity: Helping or Hindering Big Data?

Automated cybersecurity for big data is becoming popular with many organizations. But can automated cybersecurity keep up with ever-evolving cyber threats?

VIDEO: Access Control May be the Key for Preventing Data Breaches

For cybersecurity experts there are certain precautions that need to be considered to safeguard personal and professional information.

When a Hack Occurs, Is It a True Cyber Attack or Cyberespionage?

The cyber community needs to get its nomenclature settled with regard to the word “cyber attack.” The term “cyber attack” is popular; it creates good headlines and gets good clicks on search engines.

U.S. States Fight for Net Neutrality and Consumer Privacy

Net neutrality will affect the data privacy of users that choose not to pay for premium service or lack the resources to do so.

Can Google or Facebook Spy on Me through My Phone’s Microphone?

Lately, we have received dozens of messages at InCyberDefense. Readers have asked if it is possible for Facebook or Google to listen in on real-world conversations through a smartphone’s microphone.

Bots: How to Distinguish the Good from the Harmful Bots

Some bots are useful, but other bots are not so harmless. There are three ways to protect yourself from damage caused by harmful bots.

IMSI Catchers Revive a Heated Debate on Privacy versus Security

Over the past several years, a relatively new technology called a cell site simulator has emerged. This technology is known as an IMSI Catcher or Stingray.

Money Laundering through Bitcoin Transactions Creates More Challenges for Law Enforcement

Money laundering is a problem that has plagued the United States and the world economy for a long time. To put this problem in perspective, the United Nations Office on Drugs and Crime estimates that between $800 billion and $2 trillion is laundered globally a year.

Insider Threats and Mitigating the Harm They Cause

Insider threats are one of cybersecurity’s ongoing challenges. In today’s Bring Your Own Device (BYOD) age, employees are constantly connected to their offices through smartphones, tablet computers and laptops.

Maintaining Shareable Content Privacy in the Age of Social Media Intelligence

Social media platforms like YouTube, Facebook and Twitter provide instantaneous marketing opportunities across a spectrum of countries. But these sites are also quick and easy ways for users to fall prey to cyber exploitation.