Home Wes O'Donnell

Wes O'Donnell

A veteran of both the US Army and US Air Force, Professor Wes O’Donnell is a highly sought after presenter who has recently spoken at TEDx on Data Visualization and the US Air Force Academy on Leadership. He is noted for his fascinating, informative, dynamic and entertaining keynotes. Wes educates companies and government organizations on a number of topics ranging from emerging technology and big data visualization to veteran’s issues and leadership. But Wes’ best talks tend to center around his personal journey from poverty to distinguished entrepreneur and professor; a truly inspiring journey.

The Art of Deception and Why Eastern European Soldiers Always Wear Ski Masks

I recently interviewed five Ukrainian soldiers who are fighting against Russian-backed separatists in the Donbas region of eastern Ukraine. During my interview, I jokingly asked one young soldier, who calls himself Myhalych, “Why do Russian and Ukrainian soldiers always wear balaclavas?”

Ukrainian Soldiers Tell of Fighting in Europe’s Forgotten War

At this very moment, a war rages on in Europe. It is a war with no monuments. No parades. No victories. Only casualties.

The Future of Security: New Security, Cyber Defense Technologies Will Highlight ISC West Conference

It's that time of the year when security officials head for the International Security Conference and Exposition, also known as ISC West, in Las Vegas. This year's conference runs from April 10 to April 13.

What Search Engines Really Provide a "Private" Browsing Experience?

Google knows almost everything about you. Even if anonymity is not your priority, there are other search engines that can help you hide your queries.

Iranian Hackers Charged with Hacks of 144 US Universities

Many cyber defenders watch for Chinese and Russian hackers. However, we must not forget that smaller countries are also in the cyber attack game.

Automated Cybersecurity: Helping or Hindering Big Data?

Automated cybersecurity for big data is becoming popular with many organizations. But can automated cybersecurity keep up with ever-evolving cyber threats?

VIDEO: Access Control May be the Key for Preventing Data Breaches

For cybersecurity experts there are certain precautions that need to be considered to safeguard personal and professional information.

When a Hack Occurs, Is It a True Cyber Attack or Cyberespionage?

The cyber community needs to get its nomenclature settled with regard to the word “cyber attack.” The term “cyber attack” is popular; it creates good headlines and gets good clicks on search engines.

U.S. States Fight for Net Neutrality and Consumer Privacy

Net neutrality will affect the data privacy of users that choose not to pay for premium service or lack the resources to do so.

Can Google or Facebook Spy on Me through My Phone’s Microphone?

Lately, we have received dozens of messages at InCyberDefense. Readers have asked if it is possible for Facebook or Google to listen in on real-world conversations through a smartphone’s microphone.