Inner Circle Podcast: Episode 010 – Bill Mann Talks DevOps and Election Security

Inner Circle Podcast: Episode 010 – Bill Mann Talks DevOps and Election Security

My guest on this episode of the Inner Circle podcast is Bill Mann, Chief Product Officer for Centrify. We talk about what Centrify is doing to secure and protect DevOps environments, and then also discuss the Secure the Vote initiative that Centrify is driving in the months leading up to ... Read More
Inner Circle Podcast: Episode 009 – Scott Scheferman Explains Predictive Advantage

Inner Circle Podcast: Episode 009 – Scott Scheferman Explains Predictive Advantage

Scott Scheferman, a Senior Director of Global Services for Cylance, is my guest on this episode of the Inner Circle podcast. Scott and I discuss what predictive advantage is and why it matters in the context of defending networks and systems against emerging malware threats and exploits. I’ve been a ... Read More

This Isn’t a Tech Thriller: IoT Attacks Are Real

If you read enough tech thriller or science fiction books, you’re bound to be familiar with a super villain using some kind of technology to wreak havoc across the planet—often triggered by hacking critical internet-of-things (IoT) systems. But the fact is, not all IoT attacks lead to a dystopian hellscape, ... Read More
The Zero Trust Model Provides a More Proactive Approach to Security

The Zero Trust Model Provides a More Proactive Approach to Security

Companies are under siege from a virtually endless onslaught of malware attacks, exploits, and other attempts to compromise servers, applications or data—and most are not doing very well at defending against it. A scan of news headlines from the past couple years will illustrate the fact that the traditional approach ... Read More

4 Tips to Secure Your Online Gaming Accounts

In a perfect world, you would be playing your favorite online action, shooter, and fantasy games without concern—in a magical world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

My guest for this episode of the Inner Circle podcast is Daniel Miessler, Director of Advisory Services for IOActive. Daniel presented a session at IOAsis a few weeks ago while we were in San Francisco attending the RSA Conference. I was not able to attend, but the session title–“Machine Learning ... Read More
Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

My guest on this episode of the Inner Circle podcast is Corey Williams, Senior Director of Product Management at Centrify. The focus of our chat is next-gen access, and how the principle of zero trust security is a better approach for identity and access management. I think we can all ... Read More

4 Tips to Secure Your Online Gaming Account and Prevent It from Getting Hacked

In a perfect world, you would be playing your favorite online action, shooter, and casino games without concern—in a fantasy world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Review: iStorage DiskAshur Pro 2 Portable SSD

Review: iStorage DiskAshur Pro 2 Portable SSD

There are a number of reasons that you might want to transport data on an external, portable storage device like a USB thumb drive or portable hard drive or SSD unit—you may need to share data with or deliver data to someone, you might want to transport data without having ... Read More
Robots Want Bitcoins Too!

Inner Circle Podcast: Episode 004

My guest on the Inner Circle podcast this week is Cesar Cerrudo, CTO of IOActive. Our topic revolves around ransomware–but with a twist that involves robots. I think we can all agree that ransomware is annoying. When it comes to the standard ransomware business model of encrypting data and holding ... Read More
Loading...