Search This Blog
Cybersecurity, cyber crisis management, and threat intel professional. Speaker, author, strong advocate for women in cybersecurity. I use my expertise and voice to provide counsel to CSOs, CISOs, and CIOs at the world’s largest corporations and governments. Volunteering: RSA Conference Hackers & Threats, Your Everyday Cyber Podcast, TLV U Interdisciplinary Cyber Research Ctr, WiCys speaker, SC Media Women in Security Awards committee, BSIDES, OWASP, Wizer security, Cyber Together.
Posts
Showing posts from January, 2018
IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity
- Get link
- X
- Other Apps
CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data
- Get link
- X
- Other Apps