Change your cover photo
Upload
mmirand1
Change your cover photo
This user account status is Approved
Michael
Business Administration
E124
Miranda
Assistant Professor of Information Security and Assurance
808-689-2481

---

  • Juris Doctorate
    Gonzaga University School of Law
  • Bachelor of Arts, Information and Computer Sciences
    University of Hawaii at Manoa
  • Bachelor of Arts, English
    University of Central Florida
  • Assistant Professor, University of Hawaii - West O'ahu
    August 2017 - Present
  • Principal Consultant, Spartix
    July 2017 - Present
  • Attorney, Miranda LLLC
    June 2017 - Present
  • Director of Information Security, Hawaiian Telcom
    Sr. Manager, Product Management
    Sr. Manager, Managed Services
    April 2011 - July 2017
  • Program Manager, Referentia Systems, Inc.
    Security Analyst
    November 2010 - February 2015
  • Computer Network Security Analyst, Northrop Grumman
    Software Developer
    November 2005 - November 2010
  • Programmer Analyst, Verizon Federal Network Systems
    February 2005 - November 2005
  • Software Project Lead, 21st Century Systems, Inc.
    May 2004 - February 2005
  • Legislative Attorney, Hawaii State Senate
    December 1997 - July 2003
  • Attorney At Law
    February 1998 - December 2000
  • ISA 320 - Fundamentals of Secure Software Programming
  • ISA 340 - Introduction to Digital Forensics
  • CENT/ITS 410 - IT Project Management
  • APSC 486 - Senior Project (Capstone for CENT, IT and ISA)

Enhancing Cybersecurity Awareness Training: A Comprehensive Phishing Exercise Approach
Vol. 14 No. 2 2018
International Management Review
Email communications is a critical service in nearly every aspect of business and personal activities. A person’s email address is the online identity most relied upon for reliable and accountable communications. Banking, health and recreational activities conducted online in most cases depend on a person possessing and actively maintaining an email address. Unfortunately, email inherently possesses security shortcomings that enable malicious actors to commit fraud through phishing emails. Technology solutions do not entirely solve this issue, and the users themselves require training on how to identify and respond to suspected phishing emails. A structured and comprehensive phishing exercise training program can (1) reduce the probability of a cybersecurity compromise originating from fraudulent emails and (2) improve the overall cybersecurity posture.

Train staff to spot phishing by sending it dummy emails 
Jul 11, 2017 
Honolulu Star Advertiser 
The recent worldwide ransomware attacks put a spotlight on two key cybersecurity issues. 

Vigilance is prime defense against influx of fake news 
Jun 13, 2017 
Honolulu Star Advertiser 
References to fake news have certainly increased over the last two years. What is fake news? 

Software updates are vital, as global cyberattack proves 
May 19, 2017 
Honolulu Star Advertiser 
More than four years ago, on April 23, 2013, the Honolulu Star-Advertiser published the Tech View column “Aggressive, elusive hackers hold computers for ransom,” written by Beau Monday, who held my current position at Hawaiian Telcom. 

Parents should teach children responsible user of social media 
Apr 18, 2017 
Honolulu Star Advertiser 
A recent survey by Fluent identified YouTube, Instagram, Snapchat and Facebook as the most popular networks used by adults age 18 to 24. 

Take time to ensure tax data is secure before filing returns 
Mar 21, 2017 
Honolulu Star Advertiser 
Whether you prepare your own filings or use a professional tax preparer, there are cybersecurity actions that you should consider. 

Observe employees’ actions to eliminate insider threats 
Feb 21, 2017 
Honolulu Star Advertiser 
Recent political news has highlighted how unauthorized leaks of sensitive information can cause economic harm to a company, embarrass an individual to the point of requiring a resignation, and threaten national security. 

Government playing a role in adoption of cybersecurity 
Jan 24, 2017 
Honolulu Star Advertiser 
Software development is currently unregulated, which has upsides and downsides. But there are indications that this may be about to change. 

Cybersecurity headlined tech news in 2016 
Dec 27, 2016 
Honolulu Star Advertiser 
There was a lot of bad news relating to cybersecurity this year. We had the largest breach ever, involving more than a billion Yahoo user accounts, and the largest distributed denial of service attack, which disrupted business operations nationwide. 

Devices controlled by voices always recording their users 
Nov 29, 2016 
Honolulu Star Advertiser 
Seamless always-on voice control of our devices is the consistent indicator of a technologically advanced culture in TV shows and movies. 

Take steps to lessen effect of denial-of-service attacks 
Nov 1, 2016 
Honolulu Star Advertiser 
The distributed denial of service (DDoS) attack on Oct. 21 prevented access to major websites and services, including Twitter, Netflix, Reddit, CNN, sites based in Europe and hundreds more. 

Range of cybersecurity tips will help keep devices safe 
Oct 4, 2016 
Honolulu Star Advertiser 
October is National Cybersecurity Awareness Month. The purpose of this annual campaign is to raise awareness about cybersecurity. Below are my top five tips. 

Caution needs to temper rush to smart machines 
Sep 6, 2016 
Honolulu Star Advertiser 
The simultaneous rise and convergence of key technologies is finally accelerating the development of capabilities we dreamed about decades ago: virtual reality (VR) and artificial intelligence (AI). 

Tight Apple security system keeps malware off iPhones 
Aug 9, 2016 
Honolulu Star Advertiser 
On July 27 Apple CEO Tim Cook announced that Apple recently sold the billionth iPhone. It is a staggering achievement. The first iPhone was sold in 2007, and it took only nine years to sell 1 billion. 

When traveling far afield, guard smartphone closely 
Jul 12, 2016 
Honolulu Star Advertiser 
With summer in full swing, many of us are traveling to the mainland and foreign destinations for vacations and business. Along with our toothbrushes, clothes and other traveling essentials, we are bringing our internet-enabled mobile devices such as smartphones and laptops. 

Airtight encryption makes cybersecurity a challenge 
Jun 14, 2016 
Honolulu Star Advertiser 
If I were to choose a word that encapsulates the focus of the cybersecurity industry for the last two years, it would be “encryption.” However, the boon in increased encryption has created new challenges for enterprises. 

Passwords are not gone yet, so vigilance is still essential 
May 17, 2016 
Honolulu Star Advertiser 
Bill Gates predicted the death of the password in 2004, and others have wished for its demise over the years. However, only now are we starting to see passwords being incrementally replaced in the technology we use. 

Institutions must increase dedication to cybersecurity 
Apr 19, 2016 
Honolulu Star Advertiser 
A recent study analyzing cybersecurity education at top American universities found that none of the top 10 computer science programs requires cybersecurity as a course for graduation. This means that thousands of computer experts who will be building our future technology might have no formal cybersecurity training. 

Strong encryption protects customers, builds business 
Mar 22, 2016 
Honolulu Star Advertiser 
The ongoing legal battle between the FBI and Apple has highlighted an information security capability that experts have advocated for years to be implemented in their enterprises: data encryption. Encryption protects readable data by converting it into data that cannot be understood without authorization or a special key. 

Insurance helps companies offset data breach expenses 
Feb 23, 2016 
Honolulu Star Advertiser 
As data breaches become more common, we tend to pay less attention when we hear about hackers stealing millions of records containing sensitive personal and financial information. It’s becoming just another news story. 

Cyberthreat analysis crucial — maybe too crucial to share 
Jan 26, 2016 
Honolulu Star Advertiser 
Last year there was a lot of hype around the term “cybersecurity intelligence” from information security service providers and consultants. Behind this buzz were substantive government actions that were intended to increase the sharing of intelligence on cyberthreats between the private industry and federal agencies.

  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Systems and Network Auditor (GSNA)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Reverse Engineering Malware (GREM)
  • Hawaii State Bar Association
  • Registered Patent Attorney - U.S. Patent and Trademark Office
  • Curriculum Committee Member
    Fall 2017 - Present