Blog

What's the latest?

Recent Posts

November 10, 2018

Cybercriminals Using AI to fuel Hacking

In 2016, ZeroFOX took to Twitter with an automated spear phishing attack to determine if machines...

November 7, 2018

Why Cyber Risk Management is Not Working

Very few organizations are confident that they can effectively manage cyber risks and attacks tar...

November 5, 2018

The Other Half of the Equation

These are a few of the ways we can control the variables, manage the risk environment and ultimat...

April 14, 2018

Cyber Security Threats

In order to be able to accomplish the goal of preventing the damage from significant risk forces,...

April 6, 2018

What do we aspire for?

Almost 20 years ago, I was living in a 20X20 basement apartment. I was fresh out of art school, ...

Retrospection vs. Prediction

Many years ago, I was watching the movie “A Brief History in Time” featuring Steven Hawking. In o...

Shifting sand for bad guys…

For several years, we have been considering various concepts around cyber deception and moving ta...

The silo we call security

Eighteen years ago, in the crowded shuffle of NYC, I had a packed day of back to back meetings to...