Information Security Leader, Author, Instructor and Speaker

Default utility Image

When Is a Business Ready for a Red Team Test? TAGS: | | | Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →

Default utility Image

Iran Doesn’t Have Nukes Yet, But It Has a Powerful Weapon It Can Use Right Now TAGS: This week’s collapse of the Iranian nuclear deal justifiably caused global consternation at the thought of Iran moving closer to becoming a nuclear power. …Continue reading →

Default utility Image

2017 in Review: The Top Cybersecurity News Stories TAGS: | | | | | | 2017 was quite a year in the world of cybersecurity! From the politicization of cyberwarfare to several major data breaches, hardly …Continue reading →

Cyberwarfare: Information Operations in a Connected World TAGS: | Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that …Continue reading →