“I had the pleasure of working with Anthony following BlackBerry’s acquisition of Cylance where he was Head of Editorial and the prime driver of the company’s award winning cybersecurity resource blog – ThreatVector. Anthony is exceptionally knowledgeable of the cybersecurity and enterprise IT landscape and is adept at writing, producing and overseeing insightful thought leadership content to drive brand awareness, perception and preference. Anthony is a great leader, knows how to get the best out of those he works with and has proven time and again that he can spearhead and deliver impactful research projects that drive results, eyeballs and leads. I would wholeheartedly recommend him to any technology company looking to take their strategic communications function to the next level. ”
About
Activity
-
VentureBeat: "#LockBit is blowing a lot of smoke lately to try to rehabilitate its reputation with affiliate attackers. We do continue to see new…
VentureBeat: "#LockBit is blowing a lot of smoke lately to try to rehabilitate its reputation with affiliate attackers. We do continue to see new…
Liked by Anthony M. Freed
-
At the RSA Conference 2024 Halcyon spoke to some of the most interesting people in attendance including best selling author Mike Daugherty - check it…
At the RSA Conference 2024 Halcyon spoke to some of the most interesting people in attendance including best selling author Mike Daugherty - check it…
Liked by Anthony M. Freed
-
If you haven't seen the news yet, Halcyon has identified a new ransomware attack group. You can read more about it on our website:…
If you haven't seen the news yet, Halcyon has identified a new ransomware attack group. You can read more about it on our website:…
Liked by Anthony M. Freed
Experience & Education
Publications
-
Ransomware and Data Extortion Business Risk Report
Halcyon
Halcyon published a new study detailing the significant impact on businesses from ransomware and data extortion attacks over the past 24 months. According to the Ransomware and Data Extortion Business Risk Report, one-in-five (18%) suffered a ransomware infection 10 or more times in a 24-month period, one-in-five (18%) were infected 5-9 times, and 30% were infected 2-4 times. Data exfiltration occurs in nearly every major ransomware attack today, and nearly two-thirds (60%) of respondents said…
Halcyon published a new study detailing the significant impact on businesses from ransomware and data extortion attacks over the past 24 months. According to the Ransomware and Data Extortion Business Risk Report, one-in-five (18%) suffered a ransomware infection 10 or more times in a 24-month period, one-in-five (18%) were infected 5-9 times, and 30% were infected 2-4 times. Data exfiltration occurs in nearly every major ransomware attack today, and nearly two-thirds (60%) of respondents said that sensitive or regulated data was exfiltrated from their organization, with more than half (55%) reporting the attackers issued an additional ransom demand to protect the exfiltrated data. As well, 58% of victims reported that the loss of sensitive data put their organizations at additional risk of regulatory action and lawsuits. “The disconnect between perceived and actual risk is not helping organizations be more resilient to ransomware attacks,” said Anthony M. Freed, Halcyon Director of Research and Communications. “While most respondents feel confident their current security deployments are adequate for both prevention and recovery, the data shows that the majority of attacks are nonetheless successful and victim organizations are struggling to get operations back up and running, which is what is driving up these post-attack recovery costs.”
-
What Executives Should Know About Ransomware
Halcyon
Ransomware is no longer considered a boutique threat, but rather one of the most significant threats to any organization. The vast majority (75%) of organizations reported being targeted by at least one ransomware attack in 2023, with 26% reporting they were targeted with ransomware four or more times. By fostering a culture of security, CXOs can create an environment where employees understand the importance of protecting the organization's digital assets and are actively engaged in preventing…
Ransomware is no longer considered a boutique threat, but rather one of the most significant threats to any organization. The vast majority (75%) of organizations reported being targeted by at least one ransomware attack in 2023, with 26% reporting they were targeted with ransomware four or more times. By fostering a culture of security, CXOs can create an environment where employees understand the importance of protecting the organization's digital assets and are actively engaged in preventing ransomware attacks. In this reference guide, we explore what each C-level executive should know about ransomware in order to ensure a strong security posture and protect their organization...
-
Power Rankings: Ransomware Malicious Quartile Extortion Attack Group Guide (quarterly report)
Halcyon
Ransomware attacks continue to be extremely lucrative, with ransom demands and recovery costs bleeding victim organizations for millions of dollars. And things change fast in this space – RaaS groups rise and fall with law enforcement takedowns, or disband and reorganize under different brands, so it can all be a little confusing. Each quarter, the Halcyon team of ransomware experts put together a RaaS power rankings guide for the ransomware threat landscape.
-
Cloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps)
Halcyon
In this report, Halcyon demonstrates a unique method for identifying C2P entities that can potentially be used to forecast the precursors of ransomware campaigns and other attacks significantly “left of boom.” Halcyon also identifies two new, previously undisclosed ransomware affiliates we track as Ghost Clown and Space Kook that currently deploy BlackBasta and Royal, respectively. We also describe how we used the same method to link the two ransomware affiliates to the same Internet Service…
In this report, Halcyon demonstrates a unique method for identifying C2P entities that can potentially be used to forecast the precursors of ransomware campaigns and other attacks significantly “left of boom.” Halcyon also identifies two new, previously undisclosed ransomware affiliates we track as Ghost Clown and Space Kook that currently deploy BlackBasta and Royal, respectively. We also describe how we used the same method to link the two ransomware affiliates to the same Internet Service Provider, Cloudzy, which accepts cryptocurrencies in exchange for anonymous use of its Remote Desktop Protocol (RDP) Virtual Private Server (VPS) services. It is well known that ransomware syndicates rely on a broad ecosystem of initial access brokers, malware and exploit developers, and criminal affiliates to run their illicit enterprises. But few realize that they also rely on a global system of legitimate service providers, like Cloudzy, who appear to act as Command-and-Control Providers (C2P).
-
The AI Revolution in Cybersecurity: Transforming the Landscape
Bora
AI now emerges as a game-changer, pushing boundaries beyond imagination. What was once limited to mere weather forecasts or random music playlists, AI has evolved into a dynamic entity, shaping education, businesses, and even governmental policies. We sat to chat with curious students, seasoned CISOs, and various people in roles in between to find out what they think of AI in cybersecurity and to consider what may lie ahead.
Other authorsSee publication -
Introductory Guide to Enterprise Ransomware Defense Strategy
Halcyon
Ransomware is fundamentally different from other forms of malware as it is purposely disruptive to an organization. General Remote Access Trojans (RATs) provide ingress into networks, and info stealers exfiltrate sensitive data, but neither grind business operations to a halt. Ransomware is no longer considered just a technical threat, but rather the largest single risk to any organization. According to research from 2022, 85% of companies are the victim of at least one ransomware attack per…
Ransomware is fundamentally different from other forms of malware as it is purposely disruptive to an organization. General Remote Access Trojans (RATs) provide ingress into networks, and info stealers exfiltrate sensitive data, but neither grind business operations to a halt. Ransomware is no longer considered just a technical threat, but rather the largest single risk to any organization. According to research from 2022, 85% of companies are the victim of at least one ransomware attack per year, and 74% have experienced multiple attacks. Current endpoint protection solutions available on the market, while robust and effective for many threats, do not fully protect against ransomware attacks because they were designed to find and block commodity malware. This paper provides guidance n defending your organization from advanced ransomware operations.
-
Operation-Centric Security: Leveraging Indicators of Behavior for Early Detection and Predictive Response
Cybereason
An Operation-Centric approach can deliver detection and response automation at scale by leveraging Indicators of Behavior (IOBs), the more subtle signs of an attack that can surface the entire malicious operation at its earliest stages, allowing for earlier detections that inform a predictive response capability for comprehensive remediation that our current reliance on retrospective Indicators of Compromise can never deliver.
This paper details the Operation-Centric approach and how it…An Operation-Centric approach can deliver detection and response automation at scale by leveraging Indicators of Behavior (IOBs), the more subtle signs of an attack that can surface the entire malicious operation at its earliest stages, allowing for earlier detections that inform a predictive response capability for comprehensive remediation that our current reliance on retrospective Indicators of Compromise can never deliver.
This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses, which is key to finally reversing the adversary advantage and returning the high ground to the Defenders. -
Ransomware: The True Cost to Business (2022)
Cybereason
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second…
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second time, with 68% saying the second attack came less than a month later and threat actors demanded a higher ransom amount...
Other authorsSee publication -
RansomOps: Inside Complex Ransomware Operations and the Ransomware Economy
Cybereason
Ransomware purveyors are moving away from high-volume attacks with low ransom demands in favor of more focused, custom attacks aimed at individual organizations selected for the ability to pay multi-million dollar ransom demands. These more complex ransomware operations, or RansomOps, involve highly targeted, complex attack sequences by sophisticated threat actors. The burgeoning Ransomware-as-a-Service (RaaS) industry has also lowered the technical bar for many would-be attackers by making…
Ransomware purveyors are moving away from high-volume attacks with low ransom demands in favor of more focused, custom attacks aimed at individual organizations selected for the ability to pay multi-million dollar ransom demands. These more complex ransomware operations, or RansomOps, involve highly targeted, complex attack sequences by sophisticated threat actors. The burgeoning Ransomware-as-a-Service (RaaS) industry has also lowered the technical bar for many would-be attackers by making complex attack infrastructure available to low-skilled threat actors. This white paper examines the growing threat from complex RansomOps, as well as the larger Ransomware Economy, and provides prescriptive guidance for organizations determined to remain undefeated by ransomware attacks.
-
Anthony Freed: Lead Them Where They’re Dying to Go (podcast)
The No Name Security Podcast
When you look back over the last 10+ years of what has happened in the world of Cybersecurity, something that is incredibly important is how the stories are portrayed. That’s a key word: story. We get news all day every day to the point that it becomes white noise, even to those affected by it. What cannot be denied is that when cybersecurity events unfold, the information has to get out to the public in a way that they understand, can digest it, then act and react accordingly. Anthony Freed is…
When you look back over the last 10+ years of what has happened in the world of Cybersecurity, something that is incredibly important is how the stories are portrayed. That’s a key word: story. We get news all day every day to the point that it becomes white noise, even to those affected by it. What cannot be denied is that when cybersecurity events unfold, the information has to get out to the public in a way that they understand, can digest it, then act and react accordingly. Anthony Freed is a pioneer in getting that graduate level calculus into a format that all of us can understand in order to take the appropriate actions to ensure that we are protected...
Other authorsSee publication -
Contributor: Malicious Life
Cybereason
Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
-
Contributor: Security Boulevard
Security Boulevard
Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
-
Organizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a…
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a ransomware attack, a situation that can factor into employee job satisfaction and potential burnout. One surprising finding in the study included 70% of respondents confessing that they have been intoxicated while responding to a ransomware attack during a weekend or holiday, a risk factor that many organizations may not have accounted for in their incident response planning...
Other authorsSee publication -
Indicators of Behavior: An Orthogonal Approach to Early Attack Detection
Intersec: The Journal of Cybersecurity (UK)
Despite all of the tremendous progress the security industry has made over the last 30-plus years, solving for one critical problem seems to remain as elusive as ever: how do we detect and stop advanced attacks before they escalate to full-scale security events? This article makes an argument for the development of an extensible language to both detect and describe the most subtle chains of malicious activity that will result in better detections earlier in the attack kill chain by leveraging…
Despite all of the tremendous progress the security industry has made over the last 30-plus years, solving for one critical problem seems to remain as elusive as ever: how do we detect and stop advanced attacks before they escalate to full-scale security events? This article makes an argument for the development of an extensible language to both detect and describe the most subtle chains of malicious activity that will result in better detections earlier in the attack kill chain by leveraging Indicators of Behavior (IoBs)...
Other authorsSee publication -
Malicious Life Podcast: The Jester - Hacktivist for Good
Malicious Life Podcast
The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester's operations were little more than internet sleight-of-hand. So, who is The Jester and what can we make of his reported exploits? Security journalist Anthony M. Freed, the first to do a series of interviews with The Jester, joins podcast to lend his perspective...
-
Ransomware: The True Cost to Business (2021)
Cybereason
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the…
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the end only exacerbates the problem by encouraging more attacks. Getting in front of the threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive ransomware before they can hurt the business.
Other authorsSee publication -
PHI Magazine - Executive Editor
Cylance / BlackBerry
Phi explores the math and science that powers artificial intelligence (AI)...
-
Live at Infosec18 - Let's Stop Selling Cybersecurity on Fear, Uncertainty & Doubt
Infosecurity Magazine
A panel of experts lead by Contributing Editor Dan Raywood discusses the prevelence of FUD in the security industry and its repercussions live at the Infosecurity Europe Conference.
-
Journal of Law and Cyber War, Cyber Security, Cyber Terrorism: "The Ransomware Assault on the Healthcare Sector"
Journal of Law and Cyber Warfare; JLCW Volume 6, Winter 2018, Issue 2
JLCW Volume 6, Winter 2018, Issue 2: "The Ransomware Assault on the Healthcare Sector"
-
RMISC Keynote Panel 2016
Rock Mountain Information Security Conference
The Rocky Mountain Information Security Conference (RMISC) recently held its tenth annual conference on May 11th - 12th, 2016 at the Colorado Convention Center in Denver,
CO.
RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who would like a glimpse into the fast-moving developments within the field.
This year’s event drew a record number of attendees because of its lineup of renowned panel of experts, including…The Rocky Mountain Information Security Conference (RMISC) recently held its tenth annual conference on May 11th - 12th, 2016 at the Colorado Convention Center in Denver,
CO.
RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who would like a glimpse into the fast-moving developments within the field.
This year’s event drew a record number of attendees because of its lineup of renowned panel of experts, including the high-profile keynote speaker John McAfee, who is currently running as the Libertarian Party candidate for president.
McAfee pioneered commercial antivirus when he founded McAfee Anti Virus in 1987; he is considered one of the greatest, most controversial and outspoken minds when it comes to Information Security and privacy. Prior to McAfee Associates, John has held positions at NASA, Univac, Xerox, CSC & Lockheed.
McAfee surprised those in attendance at the opening plenary by crashing the opening Ambassador's Keynote Panel, and we were lucky to have captured the event...Other authorsSee publication -
Arlington CISO Dave Jordan on Why We're Losing the Cyberwar
Cyber Defense Magazine - Special RSA Conference Edition
-
(ICS)2 Congress - ASIS Conference Speaker, Fall 2014
Discussion about business skills that make Cyber Security professionals successful. Cyber Security is usually thought of as mainly a technical domain, yet it has a reach far outside just technical aspects. Hear from a panel of experts about what business skills are needed to overcome challenges often faced by security professionals. The discussion will benefit all security professionals.
Other authorsSee publication -
Contributor: Data Privacy, Information Security and Cyber Insurance Trends Report (3rd Annual Edition)
Cyber Data Risk Managers
This 3rd annual Cyber Data Risk Managers 2014 report, released on Data Privacy Day January 28, 2014, shows our commitment to data privacy and our continued support to help empower businesses and organizations to make the protection of privacy and data a great priority in their environments. Included in this report, are many invaluable insights and recommendations offered by Data Privacy and Information Security industry experts that will prove useful for businesses and organizations…
This 3rd annual Cyber Data Risk Managers 2014 report, released on Data Privacy Day January 28, 2014, shows our commitment to data privacy and our continued support to help empower businesses and organizations to make the protection of privacy and data a great priority in their environments. Included in this report, are many invaluable insights and recommendations offered by Data Privacy and Information Security industry experts that will prove useful for businesses and organizations, regardless of industry or sector...
-
Contributor: Infosec Institute
Infosec Institute
Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
-
Author: TechTarget / SearchSecurity
TechTarget
Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
-
Contributor: DATA PRIVACY, INFORMATION SECURITY AND CYBER INSURANCE TRENDS REPORT
Cyber Data Risk Managers
Cyber insurance, aka “privacy and security” insurance continues to evolve as many more
businesses, organizations and risk managers are realizing that it can be used as a way to
respond to a data breach and/or security incident and as a key component of an incident
response plan. -
Security Flaws Exposed at Washington, D.C. Airports
Network World
The Metropolitan Washington Airport Authority (MWAA) earlier this year published a document to its website containing sensitive security information that terrorists could potentially have used to launch cyber and physical attacks against Reagan National and Dulles International airports in Washington, D.C. The document included a detailed map of Ronald Reagan Washington National Airport, a diagram of the entire electronic security system - including connection and protocol details for key…
The Metropolitan Washington Airport Authority (MWAA) earlier this year published a document to its website containing sensitive security information that terrorists could potentially have used to launch cyber and physical attacks against Reagan National and Dulles International airports in Washington, D.C. The document included a detailed map of Ronald Reagan Washington National Airport, a diagram of the entire electronic security system - including connection and protocol details for key components - and an outline of which COTS hardware/software are used, down to the router brands and types...
-
Indian Hackers Claim to Have U.S. Government Passwords
NBC News
The Indian hacker group that released Symantec anti-virus source code earlier this month now says it has more proof that Indian intelligence agencies are spying on the U.S. government. Infosec Island's Anthony M. Freed posted an article saying one of the Indian hackers, who calls himself "YamaTough," gave him 68 sets of usernames and passwords for U.S. government network accounts. YamaTough told Freed the account data is just a sample of the information the hacker group, the "Lords of…
The Indian hacker group that released Symantec anti-virus source code earlier this month now says it has more proof that Indian intelligence agencies are spying on the U.S. government. Infosec Island's Anthony M. Freed posted an article saying one of the Indian hackers, who calls himself "YamaTough," gave him 68 sets of usernames and passwords for U.S. government network accounts. YamaTough told Freed the account data is just a sample of the information the hacker group, the "Lords of Dharmaraja," copied from Indian government servers...
-
Contributor: SeekingAlpha
SeekingAlpha
Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
Projects
-
U.S. Security Journalist Delegation to Israel
The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.
The delegation was co-sponsored by the…The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.
The delegation was co-sponsored by the government of Israel and the America-Israel Friendship League, whose mission is to strengthen the relationship between the people of the United States and Israel, by presenting to our AIFL Community members the inspiring virtues of Israel with emphasis on beyond-the-conflict topics.
Throughout the visit, the leadership delegation focused on Israel’s cybersecurity eco-system, and the members met with Israeli security company CEOs such as Gil Shwed of Check Point Software Technologies, senior Israeli leaders such as PM Benjamin Netanyahu, Brigadier General (ret'd) Dr. Danny Gold, and other promising leaders in academia, industry, and defense.Other creatorsSee project -
Cyberwarzone
The goal of Cyberwarzone is to provide the world a portal with global cyberwar information. The effort in getting this cyberwarfare information is hard. But as the internet is growing we need to get an global cyberwar & cybercrime monitoring system.
https://www.facebook.com/CyberwarzoneOther creatorsSee project -
Cybersecurity Forum Panel Moderator at the Republican National Convention
-
Cleveland State University and the Cleveland-Marshall College of Law’s Cybersecurity and Privacy Protection Center together with Baldwin Wallace University hosted the nonpartisan Cyber Security Forum at the RNC Cybersecurity Forum. The event brought together technology and policy experts, lawmakers and delegates, to discuss innovative ways that the private sector, educational institutions and the government can collaborate to address one of the most serious economic and national security…
Cleveland State University and the Cleveland-Marshall College of Law’s Cybersecurity and Privacy Protection Center together with Baldwin Wallace University hosted the nonpartisan Cyber Security Forum at the RNC Cybersecurity Forum. The event brought together technology and policy experts, lawmakers and delegates, to discuss innovative ways that the private sector, educational institutions and the government can collaborate to address one of the most serious economic and national security challenges facing the nation and develop effective and fair policies that balance security and privacy.
https://www.law.csuohio.edu/academics/cybersecurity/rnc/speakers
Panel: Cybersecurity and CyberWar: Technology and Policy Issues Affecting Our National Security
This panel will provide an overview of the critical national security issues cybersecurity and the emerging cyberwarfare activities by nation states raise, including the growing tension between the privacy and security; why traditional approaches to national defense are inadequate; and the key issues that cybersecurity laws and policies should address to begin to counter these threats.
Panel members: Anthony M. Freed (moderator), Dr. Steve Belovich, Maj. Joe Billingsley, Ira E. Hoffman, Col. Marc Jamison (ret'd), and Cdr. Bernadette Semple (ret'd). -
Rocky Mountain Information Security Conference (RMISC) Ambassador and Keynote Panel Moderator
-
Event VIP Ambassador along with Javvad Malik, Jack Daniel, Jayson Street, DaveLewis, and Eddy Mize - with special guest John McAfee...
Honors & Awards
-
Winner - 17th Annual People's Choice Podcast Awards - Technology Category
Technology Category
The Malicious Life Podcast won the Technology Category honor at the 17th Annual People's Choice Podcast Awards. The People's Choice Podcast Awards is the longest running premier podcast awards event in the podcasting space open to shows worldwide. Nominees across all the categories included podcasts like ESPN Daily, NPR's This American Life, John Stewart, the FBI and DIA, tier one media like CBS and more - so we were in there with some heavy hitters! Votes cast for this year's awards numbered…
The Malicious Life Podcast won the Technology Category honor at the 17th Annual People's Choice Podcast Awards. The People's Choice Podcast Awards is the longest running premier podcast awards event in the podcasting space open to shows worldwide. Nominees across all the categories included podcasts like ESPN Daily, NPR's This American Life, John Stewart, the FBI and DIA, tier one media like CBS and more - so we were in there with some heavy hitters! Votes cast for this year's awards numbered in the tens of millions for the 300 podcasts that were nominated.
-
U.S. Security Journalist Delegation to Israel - 2016
http://aifl.org/
The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.
The delegation was co-sponsored by the…The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.
The delegation was co-sponsored by the government of Israel and the America-Israel Friendship League, whose mission is to strengthen the relationship between the people of the United States and Israel, by presenting to our AIFL Community members the inspiring virtues of Israel with emphasis on beyond-the-conflict topics.
Throughout the visit, the leadership delegation focused on Israel’s cybersecurity eco-system, and the members met with Israeli security company CEOs such as Gil Shwed of Check Point Software Technologies, senior Israeli leaders such as PM Benjamin Netanyahu, Brigadier General (ret'd) Dr. Danny Gold, and other promising leaders in academia, industry, and defense.
Recommendations received
48 people have recommended Anthony M.
Join now to viewMore activity by Anthony M.
-
Ransomware on the Move: #Play, #Cactus, #Qilin, #Cicada3301: Halcyon publishes a #RaaS and data #extortion group guide, Power Rankings: Ransomware…
Ransomware on the Move: #Play, #Cactus, #Qilin, #Cicada3301: Halcyon publishes a #RaaS and data #extortion group guide, Power Rankings: Ransomware…
Liked by Anthony M. Freed
-
RansomHub Publishes Exfiltrated Florida Health Department Data: #RansomHub published #exfiltrated #data belonging to the #Florida Department of…
RansomHub Publishes Exfiltrated Florida Health Department Data: #RansomHub published #exfiltrated #data belonging to the #Florida Department of…
Liked by Anthony M. Freed
-
I find it really cool that our team is uncovering brand new ransomware operators detonating new encryptors. Now the scary part: check out the article…
I find it really cool that our team is uncovering brand new ransomware operators detonating new encryptors. Now the scary part: check out the article…
Liked by Anthony M. Freed
-
Ransomware on the Move - We have seen recent activity of several ransomware groups, including Play, APT73, BlackSuit, and Hunters International…
Ransomware on the Move - We have seen recent activity of several ransomware groups, including Play, APT73, BlackSuit, and Hunters International…
Liked by Anthony M. Freed
-
Late to post, but had to take a moment to celebrate the incredible company I work for. The Halcyon CKO in Chicago a couple of weeks ago was the best…
Late to post, but had to take a moment to celebrate the incredible company I work for. The Halcyon CKO in Chicago a couple of weeks ago was the best…
Liked by Anthony M. Freed
-
Really awesome work by Halcyon identifying a brand new ransomware group being called "Volcano Demon." If you work in security, give this article a…
Really awesome work by Halcyon identifying a brand new ransomware group being called "Volcano Demon." If you work in security, give this article a…
Liked by Anthony M. Freed
-
Halcyon identifying and stopping Zero Day Ransomware. What's very interesting is all the services this ransomware stops to execute. Including…
Halcyon identifying and stopping Zero Day Ransomware. What's very interesting is all the services this ransomware stops to execute. Including…
Liked by Anthony M. Freed
-
At Halcyon we focus on endpoint for protection and recovery during a ransomware attack. For infrastructure other than endpoint I would strongly…
At Halcyon we focus on endpoint for protection and recovery during a ransomware attack. For infrastructure other than endpoint I would strongly…
Liked by Anthony M. Freed
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More