Search This Blog
Cybersecurity, cyber crisis management, and threat intel professional. Speaker, author, strong advocate for women in cybersecurity. I use my expertise and voice to provide counsel to CSOs, CISOs, and CIOs at the world’s largest corporations and governments. Volunteering: RSA Conference Hackers & Threats, Your Everyday Cyber Podcast, TLV U Interdisciplinary Cyber Research Ctr, WiCys speaker, SC Media Women in Security Awards committee, BSIDES, OWASP, Wizer security, Cyber Together.
Posts
3 Ways Hyper Dimensional Big Data Analytics Make Instrument Calibration Easier, Smarter and More Affordable
- Get link
- X
- Other Apps
For Cyber Attackers, Tax Filing Deadline is Where the Real Fun Begins!
- Get link
- X
- Other Apps
Heartbleed Undetected For Over Two Years – Time to Stop Bleeding
- Get link
- X
- Other Apps
All the King’s ZeuSes – 3 New Malware Features You Can Stop Worrying About
- Get link
- X
- Other Apps
Now Registering for Classes at Cybercrime U
- Get link
- X
- Other Apps
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux
- Get link
- X
- Other Apps
Is Cybercrime Ready to Crown a New KINS?
- Get link
- X
- Other Apps
¿Cómo se presenta el robo de identidad? Article in Spanish in the Colombia-based Dinero.com
- Get link
- X
- Other Apps
Bugat Joins The Mobile Revolution: BitMo Hijacking SMS-Borne OTP’s
- Get link
- X
- Other Apps