Latest Podcasts

Latest Articles

Zero-Day Browser Vulnerabilities

Zero-Day Browser Vulnerabilities“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...

read more

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn - If it is Connected It can Be HackedI remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product was...

read more

Routers and Firewalls with Broadcom Chipsets Are Vulnerable

Routers and Firewalls with Broadcom Chipsets Are VulnerableHave you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...

read more

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of AttacksWe depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...

read more

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My!Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time - patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network system...

read more

Cyber War isn’t Coming It is already Here!

Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...

read more
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

read more

Zeroing In On our Industrial Control Systems

Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks.  Now they are focusing their efforts on SCADA systems often...

read more

Connect with Me

Malcare WordPress Security