Commencing A New Decade: 2020 Predictions
At the end of 2019, I met in Boston with global IT and Security leaders to reflect on the year and develop strategic guidance for… Read More »Commencing A New Decade: 2020 Predictions
At the end of 2019, I met in Boston with global IT and Security leaders to reflect on the year and develop strategic guidance for… Read More »Commencing A New Decade: 2020 Predictions
In January 2019, I had the honor of joining industry colleagues in an open webcast discussion on Cybersecurity predictions for 2019. Vito Sardanopoli, Gary Hayslip, CISSP, Scott King… Read More »What Does 2019 Have In Store for Cybersecurity: A CISO’s Perspective
This month marks the completion of my twenty-second professional year in the technology industry. From days of system/network/IT work, in the worlds of AS400, UNIX,… Read More »Reflection after Twenty Two Years
A bunch of industry friends and colleagues were asked to provide security predictions for 2019. Here’s what we each had to say: Excerpt from Rapid7… Read More »Facing the Future: Rapid7’s 2019 Security Predictions
Repost from: Veracode blog The news regarding the NSA and its British counterpart discussed how the Angry Birds app was targeted as a means to… Read More »How Angry Is That Bird?
Repost from: MITRE Cybersecurity Mobile device security still tops the list of IT security concerns. In this post, we interview Shawn Valle about his 2-day… Read More »Cyber Training: Introduction to Android Forensics & Security Testing
Here’s a report from the first publicly released security audit of an iPad app using the iMAS developed open-source security libraries. This report shows that… Read More »hReader iOS Mobile Application Security Audit
Now Available! iMAS – iOS Mobile Application Security January 2013 iMAS is a secure iOS application framework research project focused on reducing iOS application vulnerabilities… Read More »iMAS – iOS Mobile Application Security
This is the publicly released slide deck that accompanies a 1-hour webinar that briefed the security (and anti-security) techniques of the Android operating system and… Read More »Android Forensics & Security Testing
Led research and development of white paper on technical details of developing Android mobile applications with a focus on data security and software assurance. Leveraged… Read More »Android Secure App Development Guidance for DoD