Security Risk Management—Where to Start?
September 13, 2017
Security Risk Management (SRM) is an exercise in evaluating past failures and contemplating unknown future failures of systems, people, processes, and external events. The SRM exercise is to analyze a...
Exploitabilities: Where threats and vulnerabilities intersect
July 31, 2017
Like many of you, I’ve just gotten back from Black Hat USA 2017. Black Hat was the best conference I’ve ever attended—the energy, the level of interest was unlike anything I’ve ever experience...
Everybody has a plan until they get punched in the mouth … unfortunately, it’s CISOs who are taking the hits
April 20, 2017
Mike Tyson once famously said, “Everybody has a plan until they get punched in the mouth.” Recent headlines shine a spotlight on an important issue facing the cybersecurity market today: proving c...
Nehemiah Security—Let’s Go!
October 20, 2016
I see a set of trends in the world that seem to be colliding. First, the world is becoming digital. By the end of 2017, IDC projects that over two-thirds of CEOs of Global 2000 companies will have Dig...
Heavyweight Bout of the Decade: AI vs. Cyberattackers
August 12, 2016
This is the battle that the entire industry has been waiting for – Artificial Intelligence pitted against the Cyberattacker. Soon we will see these two heavyweights square up in what promises to be...
2 winners and 3 losers of the DNC Email Hack
August 1, 2016
Few things are more revered than elections in the United States. As Americans, we get exasperated at times by the ‘making of the sausage’. But when the votes are cast we take great pride in our de...