Spooky Cyber Stats And Trends In Time For Halloween
FORBES Contributor
Global Thought Leader in Cybersecurity and Emerging Tech
Spooky Cyber Stats and Trends in Time for Halloween
Every year the stats on cyber-attacks seem to get spookie
FORBES Contributor
Global Thought Leader in Cybersecurity and Emerging Tech
Spooky Cyber Stats and Trends in Time for Halloween
Every year the stats on cyber-attacks seem to get spookie
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam.
Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the cybersecurity industry has traditionally focused on the te
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may misuse
I was recently asked “What do intelligence reports do? They appear worthless!”
I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.
There is a fundamental difference between intelligence and the ab
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!
Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry!
See the full list of profiles here: https
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design weakn
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicated to delivering accurate, timely, and valuable insi
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the devi
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!
I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some very int
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!
Never underestimate the creativity and resourcefulness of intelligent adversaries in finding ways to leverage technology for the
The SEC has fined four major companies for materially misleading investors regarding cyberattacks.
Regulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly infor
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries.
A top US national cybersecurity advisor stated in a recent op-ed, “This is a troubling practice that must
Secureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are fraudulently obtaining positions so they can victimize the employer!
I predict we will see more of these types of attac
There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive cyber capabilities that trickles down to everyday cybercriminals.
Cybersec
Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let’s take a look at what Ransomware is, how attacks typically unfold, and what potential victims can do to improve their risk posture.
Watch the full video here: http
A recent report by Trellix indicated that due to growing complexity, responsibility, and regulatory accountability, a majority of CISOs believe their role should be split into separate positions.
This finding struck me as a little odd. It seems counte
Explaining cybersecurity is challenging, but with the right visual interface, it is easier to understand the behavioral, technical, and process aspects of cyberattacks.
For the full video Explaining Ransomware: https://www.youtube.com/watch?v=njXi-NoL
Two Cryptocurrency Exchanges were recently taken down by authorities. The PM2BTC and Cryptex sites were seized.
Video: https://youtube.com/shorts/wvRelrVSOcE
This is important for two reasons:
1. It disrupts illegal money laundering, in this case, hund
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…