by John

Viewers were surprised when episode one of season three was released early on April 1st. No joke! Entire episode available to stream. Click title to view in full post.

Posted in Rick&Morty, Video

by John

“Yesterday, at the BlackHat Asia 2017 security conference, researchers from cyber-security firm Cylance disclosed two vulnerabilities in the firmware of Gigabyte BRIX small computing devices, which allow an attacker to write malicious content to the UEFI firmware.”

Posted in Cybersecurity & Infosec, Exploits & Attacks

by John

My full 2017 SC Awards introductory comments.

February 14, 2017 Read More

Posted in Blog

by John

Posted in Blog

by John

Posted in Blog

by John

I have to say I am excited!

I have wanted to host a regional security conference for a long while, and now it is about to happen. Read More

Posted in Blog

by John

From my RSA 2015 panel, “When Will InfoSec Grow Up?”

What do you think? Will the CISO evolve into CIRO? Does the CISO belong under the CIO, or maybe just operational security?  I personally think 2018 is an aggressive timeframe since many organizations still don’t have a formal CISO defined and 20% of CIOs claim they don’t think they need a CISO. It seems to me we need to inform the board (externally) with what a forward leaning organization should expect in a CISO and drive change from the top down, rather than bottom up.

Posted in Blog

by John

Posted in Blog