Translating Cybersecurity Jargon to English

Translating Cybersecurity Jargon to English

You don’t need to be technologically savvy to be able to understand cybersecurity. All you need is someone with deeper insights to explain it using friendly, everyday vocabulary. I established my writing career, more or less, on translating tech to English and my ability to help people make sense of ... Read More
Inner Circle Podcast: Episode 012 – Chris Bray Talks about Cylance Smart Antivirus

Inner Circle Podcast: Episode 012 – Chris Bray Talks about Cylance Smart Antivirus

Chris Bray, senior vice president and general manager for consumer products at Cylance, is my guest for this episode of the Inner Circle podcast. Chris joins me to talk about the new offering Cylance has for the consumer market, and what sets Cylance Smart Antivirus apart from competitors in the ... Read More
Inner Circle Podcast: Episode 010 – Bill Mann Talks DevOps and Election Security

Inner Circle Podcast: Episode 010 – Bill Mann Talks DevOps and Election Security

My guest on this episode of the Inner Circle podcast is Bill Mann, Chief Product Officer for Centrify. We talk about what Centrify is doing to secure and protect DevOps environments, and then also discuss the Secure the Vote initiative that Centrify is driving in the months leading up to ... Read More
Inner Circle Podcast: Episode 009 – Scott Scheferman Explains Predictive Advantage

Inner Circle Podcast: Episode 009 – Scott Scheferman Explains Predictive Advantage

Scott Scheferman, a Senior Director of Global Services for Cylance, is my guest on this episode of the Inner Circle podcast. Scott and I discuss what predictive advantage is and why it matters in the context of defending networks and systems against emerging malware threats and exploits. I’ve been a ... Read More

This Isn’t a Tech Thriller: IoT Attacks Are Real

If you read enough tech thriller or science fiction books, you’re bound to be familiar with a super villain using some kind of technology to wreak havoc across the planet—often triggered by hacking critical internet-of-things (IoT) systems. But the fact is, not all IoT attacks lead to a dystopian hellscape, ... Read More
The Zero Trust Model Provides a More Proactive Approach to Security

The Zero Trust Model Provides a More Proactive Approach to Security

Companies are under siege from a virtually endless onslaught of malware attacks, exploits, and other attempts to compromise servers, applications or data—and most are not doing very well at defending against it. A scan of news headlines from the past couple years will illustrate the fact that the traditional approach ... Read More

4 Tips to Secure Your Online Gaming Accounts

In a perfect world, you would be playing your favorite online action, shooter, and fantasy games without concern—in a magical world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

My guest for this episode of the Inner Circle podcast is Daniel Miessler, Director of Advisory Services for IOActive. Daniel presented a session at IOAsis a few weeks ago while we were in San Francisco attending the RSA Conference. I was not able to attend, but the session title–“Machine Learning ... Read More
Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

My guest on this episode of the Inner Circle podcast is Corey Williams, Senior Director of Product Management at Centrify. The focus of our chat is next-gen access, and how the principle of zero trust security is a better approach for identity and access management. I think we can all ... Read More

4 Tips to Secure Your Online Gaming Account and Prevent It from Getting Hacked

In a perfect world, you would be playing your favorite online action, shooter, and casino games without concern—in a fantasy world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Loading...