Being a champion for digital privacy is no easy task. The perception of privacy and its importance is constantly in flux and radically different around the globe. I am honored to be a part of this dynamic and determined community that protects and
A new study by Cambridge Cybercrime Centre titled Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies concludes that cybercrime is boring and recommends authorities change their strategy to highlight the tedium in ord
How will AI change the strategies of cybersecurity? Where will we see the first big impacts of attackers using AI?
Watch the Cyber Risk Leaders podcast...
Shamane Tan and Carmen Marsh were wonderful hosts. I had a fantastic time talking about AI and
Watch panelists Chris Roberts, G. Mark Hardy, and Matthew Rosenquist at VShield 2020
I had the honor to be on a distinguished panel with the incredibly knowledgeable G. Mark Hardy and the infamous white-hat hacker Chris Roberts. We discussed the evol
Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the l
Bugcrowd has released some interesting survey data that provides insights into the white-hat vulnerability researcher community.
Of note, most researchers were male (94%) and make less than $25k per year finding vulnerabilities. A vast majority were m
There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how Artificial Intelligence (AI) could help stop them. Not surprisingly much of the discussion is led by AI vendors in the cybersecurity spac
I am excited to be recognized with such great cybersecurity though-leaders!
Now more than ever, cybersecurity is becoming a critical pillar to the proliferation of digital technology. Trust in the devices and systems is crucial that people, companie
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
I was recently asked an interesting question: What are are the Top 5 CISO frustrations with the cybersecurity industry?
After a few minutes of deep thought and half a cup of coffee later (my 4th big cup of the day), this is what I came up with:
Top 5 C
Regardless whether you’re creating and selling software or you’re just using it to run your daily operation, you are an IT company. Show me a business which doesn’t require technology as an essential element of its strategy and I’ll show you what you
Mark your calendars. The HMG Live! Silicon Valley CISO Virtual Summit, on Aug 25th 10am Pacific, is a conference for #cybersecurity professionals interested in the latest perspectives on the shifting risks and opportunities of future business.
Digitally altered and synthetic media are becoming more of a problem. Openly available tools, including AI Deep Learning, enable the easy modification of pictures and videos for distribution on the Internet. Most are benign; clearing up acne, impro
EC-Council is announcing the #TheNextBigThingInCyber skills development in a free online event on Sept 16th 9:30am EST. EC-Council's CEO, Jay Bavisi will discuss what it means to Humanize firewalls, build a new era of ethical hackers, empower cyber
Intel has released patches for several security vulnerabilities in their Active Management Technology (AMT) and Intel Standard Manageability (ISM) platforms. One of them was a critical flaw in AMT that allowed remote privilege escalation CVE-2020-8
The first warning sign was “hackproof” in the 360Lock marketing materials. As it turns out, with no surprise to any security professional, the NFC and Bluetooth enabled padlock proved to be anything but secure.
I am seeing many security vendors developing products to unify solutions into a single management interface. I fear this is just a sales tactic to gain greater market share and not intended to help the plight of CISO’s
A recent article from ComputerWe
It simply makes no sense to call for IoT devices to be certified safe-and-secure. Before you get bent out of shape, hear me out.
Regulations are unwieldy blunt instruments, best left as a last resort. Cybersecurity regulations are not nimble, tend
Does society want governments to take on the role of protecting the Internet? Should the Internet be considered a Critical Infrastructure and therefore be overseen by governments? Will such actions undermine privacy and liberty or will it be demanded
Note: this page contains paid content.
Please, subscribe to get an access.
- Develop a comprehensive, defensive security posture to protect against ransomware
- Tools to discover and monitor attack surface to identify the entry points of attackers
- Designing a cyber resilience program and incident response program
- Created by: pritha
- Prevent, Detect And Recover From Ransomware Attacks
- Data Protection Strategy
- Created by: pritha