Anthony M. Freed

Portland, Oregon Metropolitan Area Contact Info
5K followers 500+ connections

Join to view profile

About

Anthony M. Freed is an award-winning Strategic Communications Leader enabling…

Activity

Join now to see all activity

Experience & Education

  • Halcyon

View Anthony M.’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Ransomware and Data Extortion Business Risk Report

    Halcyon

    Halcyon published a new study detailing the significant impact on businesses from ransomware and data extortion attacks over the past 24 months. According to the Ransomware and Data Extortion Business Risk Report, one-in-five (18%) suffered a ransomware infection 10 or more times in a 24-month period, one-in-five (18%) were infected 5-9 times, and 30% were infected 2-4 times. Data exfiltration occurs in nearly every major ransomware attack today, and nearly two-thirds (60%) of respondents said…

    Halcyon published a new study detailing the significant impact on businesses from ransomware and data extortion attacks over the past 24 months. According to the Ransomware and Data Extortion Business Risk Report, one-in-five (18%) suffered a ransomware infection 10 or more times in a 24-month period, one-in-five (18%) were infected 5-9 times, and 30% were infected 2-4 times. Data exfiltration occurs in nearly every major ransomware attack today, and nearly two-thirds (60%) of respondents said that sensitive or regulated data was exfiltrated from their organization, with more than half (55%) reporting the attackers issued an additional ransom demand to protect the exfiltrated data. As well, 58% of victims reported that the loss of sensitive data put their organizations at additional risk of regulatory action and lawsuits. “The disconnect between perceived and actual risk is not helping organizations be more resilient to ransomware attacks,” said Anthony M. Freed, Halcyon Director of Research and Communications. “While most respondents feel confident their current security deployments are adequate for both prevention and recovery, the data shows that the majority of attacks are nonetheless successful and victim organizations are struggling to get operations back up and running, which is what is driving up these post-attack recovery costs.”

    See publication
  • What Executives Should Know About Ransomware

    Halcyon

    Ransomware is no longer considered a boutique threat, but rather one of the most significant threats to any organization. The vast majority (75%) of organizations reported being targeted by at least one ransomware attack in 2023, with 26% reporting they were targeted with ransomware four or more times. By fostering a culture of security, CXOs can create an environment where employees understand the importance of protecting the organization's digital assets and are actively engaged in preventing…

    Ransomware is no longer considered a boutique threat, but rather one of the most significant threats to any organization. The vast majority (75%) of organizations reported being targeted by at least one ransomware attack in 2023, with 26% reporting they were targeted with ransomware four or more times. By fostering a culture of security, CXOs can create an environment where employees understand the importance of protecting the organization's digital assets and are actively engaged in preventing ransomware attacks. In this reference guide, we explore what each C-level executive should know about ransomware in order to ensure a strong security posture and protect their organization...

    See publication
  • Power Rankings: Ransomware Malicious Quartile Extortion Attack Group Guide (quarterly report)

    Halcyon

    Ransomware attacks continue to be extremely lucrative, with ransom demands and recovery costs bleeding victim organizations for millions of dollars. And things change fast in this space – RaaS groups rise and fall with law enforcement takedowns, or disband and reorganize under different brands, so it can all be a little confusing. Each quarter, the Halcyon team of ransomware experts put together a RaaS power rankings guide for the ransomware threat landscape.

    See publication
  • Cloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps)

    Halcyon

    In this report, Halcyon demonstrates a unique method for identifying C2P entities that can potentially be used to forecast the precursors of ransomware campaigns and other attacks significantly “left of boom.” Halcyon also identifies two new, previously undisclosed ransomware affiliates we track as Ghost Clown and Space Kook that currently deploy BlackBasta and Royal, respectively. We also describe how we used the same method to link the two ransomware affiliates to the same Internet Service…

    In this report, Halcyon demonstrates a unique method for identifying C2P entities that can potentially be used to forecast the precursors of ransomware campaigns and other attacks significantly “left of boom.” Halcyon also identifies two new, previously undisclosed ransomware affiliates we track as Ghost Clown and Space Kook that currently deploy BlackBasta and Royal, respectively. We also describe how we used the same method to link the two ransomware affiliates to the same Internet Service Provider, Cloudzy, which accepts cryptocurrencies in exchange for anonymous use of its Remote Desktop Protocol (RDP) Virtual Private Server (VPS) services. It is well known that ransomware syndicates rely on a broad ecosystem of initial access brokers, malware and exploit developers, and criminal affiliates to run their illicit enterprises. But few realize that they also rely on a global system of legitimate service providers, like Cloudzy, who appear to act as Command-and-Control Providers (C2P).

    See publication
  • The AI Revolution in Cybersecurity: Transforming the Landscape

    Bora

    AI now emerges as a game-changer, pushing boundaries beyond imagination. What was once limited to mere weather forecasts or random music playlists, AI has evolved into a dynamic entity, shaping education, businesses, and even governmental policies. We sat to chat with curious students, seasoned CISOs, and various people in roles in between to find out what they think of AI in cybersecurity and to consider what may lie ahead.

    Other authors
    See publication
  • Introductory Guide to Enterprise Ransomware Defense Strategy

    Halcyon

    Ransomware is fundamentally different from other forms of malware as it is purposely disruptive to an organization. General Remote Access Trojans (RATs) provide ingress into networks, and info stealers exfiltrate sensitive data, but neither grind business operations to a halt. Ransomware is no longer considered just a technical threat, but rather the largest single risk to any organization. According to research from 2022, 85% of companies are the victim of at least one ransomware attack per…

    Ransomware is fundamentally different from other forms of malware as it is purposely disruptive to an organization. General Remote Access Trojans (RATs) provide ingress into networks, and info stealers exfiltrate sensitive data, but neither grind business operations to a halt. Ransomware is no longer considered just a technical threat, but rather the largest single risk to any organization. According to research from 2022, 85% of companies are the victim of at least one ransomware attack per year, and 74% have experienced multiple attacks. Current endpoint protection solutions available on the market, while robust and effective for many threats, do not fully protect against ransomware attacks because they were designed to find and block commodity malware. This paper provides guidance n defending your organization from advanced ransomware operations.

    See publication
  • Operation-Centric Security: Leveraging Indicators of Behavior for Early Detection and Predictive Response

    Cybereason

    An Operation-Centric approach can deliver detection and response automation at scale by leveraging Indicators of Behavior (IOBs), the more subtle signs of an attack that can surface the entire malicious operation at its earliest stages, allowing for earlier detections that inform a predictive response capability for comprehensive remediation that our current reliance on retrospective Indicators of Compromise can never deliver.

    This paper details the Operation-Centric approach and how it…

    An Operation-Centric approach can deliver detection and response automation at scale by leveraging Indicators of Behavior (IOBs), the more subtle signs of an attack that can surface the entire malicious operation at its earliest stages, allowing for earlier detections that inform a predictive response capability for comprehensive remediation that our current reliance on retrospective Indicators of Compromise can never deliver.

    This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses, which is key to finally reversing the adversary advantage and returning the high ground to the Defenders.

    See publication
  • Ransomware: The True Cost to Business (2022)

    Cybereason

    Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second…

    Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second time, with 68% saying the second attack came less than a month later and threat actors demanded a higher ransom amount...

    Other authors
    See publication
  • RansomOps: Inside Complex Ransomware Operations and the Ransomware Economy

    Cybereason

    Ransomware purveyors are moving away from high-volume attacks with low ransom demands in favor of more focused, custom attacks aimed at individual organizations selected for the ability to pay multi-million dollar ransom demands. These more complex ransomware operations, or RansomOps, involve highly targeted, complex attack sequences by sophisticated threat actors. The burgeoning Ransomware-as-a-Service (RaaS) industry has also lowered the technical bar for many would-be attackers by making…

    Ransomware purveyors are moving away from high-volume attacks with low ransom demands in favor of more focused, custom attacks aimed at individual organizations selected for the ability to pay multi-million dollar ransom demands. These more complex ransomware operations, or RansomOps, involve highly targeted, complex attack sequences by sophisticated threat actors. The burgeoning Ransomware-as-a-Service (RaaS) industry has also lowered the technical bar for many would-be attackers by making complex attack infrastructure available to low-skilled threat actors. This white paper examines the growing threat from complex RansomOps, as well as the larger Ransomware Economy, and provides prescriptive guidance for organizations determined to remain undefeated by ransomware attacks.

    See publication
  • Anthony Freed: Lead Them Where They’re Dying to Go (podcast)

    The No Name Security Podcast

    When you look back over the last 10+ years of what has happened in the world of Cybersecurity, something that is incredibly important is how the stories are portrayed. That’s a key word: story. We get news all day every day to the point that it becomes white noise, even to those affected by it. What cannot be denied is that when cybersecurity events unfold, the information has to get out to the public in a way that they understand, can digest it, then act and react accordingly. Anthony Freed is…

    When you look back over the last 10+ years of what has happened in the world of Cybersecurity, something that is incredibly important is how the stories are portrayed. That’s a key word: story. We get news all day every day to the point that it becomes white noise, even to those affected by it. What cannot be denied is that when cybersecurity events unfold, the information has to get out to the public in a way that they understand, can digest it, then act and react accordingly. Anthony Freed is a pioneer in getting that graduate level calculus into a format that all of us can understand in order to take the appropriate actions to ensure that we are protected...

    Other authors
    See publication
  • Contributor: Malicious Life

    Cybereason

    Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

    See publication
  • Contributor: Security Boulevard

    Security Boulevard

    Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

    See publication
  • Organizations at Risk: Ransomware Attackers Don’t Take Holidays

    Cybereason

    The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a…

    The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a ransomware attack, a situation that can factor into employee job satisfaction and potential burnout. One surprising finding in the study included 70% of respondents confessing that they have been intoxicated while responding to a ransomware attack during a weekend or holiday, a risk factor that many organizations may not have accounted for in their incident response planning...

    Other authors
    See publication
  • Indicators of Behavior: An Orthogonal Approach to Early Attack Detection

    Intersec: The Journal of Cybersecurity (UK)

    Despite all of the tremendous progress the security industry has made over the last 30-plus years, solving for one critical problem seems to remain as elusive as ever: how do we detect and stop advanced attacks before they escalate to full-scale security events? This article makes an argument for the development of an extensible language to both detect and describe the most subtle chains of malicious activity that will result in better detections earlier in the attack kill chain by leveraging…

    Despite all of the tremendous progress the security industry has made over the last 30-plus years, solving for one critical problem seems to remain as elusive as ever: how do we detect and stop advanced attacks before they escalate to full-scale security events? This article makes an argument for the development of an extensible language to both detect and describe the most subtle chains of malicious activity that will result in better detections earlier in the attack kill chain by leveraging Indicators of Behavior (IoBs)...

    Other authors
    See publication
  • Malicious Life Podcast: The Jester - Hacktivist for Good

    Malicious Life Podcast

    The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester's operations were little more than internet sleight-of-hand. So, who is The Jester and what can we make of his reported exploits? Security journalist Anthony M. Freed, the first to do a series of interviews with The Jester, joins podcast to lend his perspective...

    See publication
  • Ransomware: The True Cost to Business (2021)

    Cybereason

    The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the…

    The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the end only exacerbates the problem by encouraging more attacks. Getting in front of the threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive ransomware before they can hurt the business.

    Other authors
    See publication
  • PHI Magazine - Executive Editor

    Cylance / BlackBerry

    Phi explores the math and science that powers artificial intelligence (AI)...

    See publication
  • Live at Infosec18 - Let's Stop Selling Cybersecurity on Fear, Uncertainty & Doubt

    Infosecurity Magazine

    A panel of experts lead by Contributing Editor Dan Raywood discusses the prevelence of FUD in the security industry and its repercussions live at the Infosecurity Europe Conference.

    See publication
  • Journal of Law and Cyber War, Cyber Security, Cyber Terrorism: "The Ransomware Assault on the Healthcare Sector"

    Journal of Law and Cyber Warfare; JLCW Volume 6, Winter 2018, Issue 2

    JLCW Volume 6, Winter 2018, Issue 2: "The Ransomware Assault on the Healthcare Sector"

    See publication
  • RMISC Keynote Panel 2016

    Rock Mountain Information Security Conference

    The Rocky Mountain Information Security Conference (RMISC) recently held its tenth annual conference on May 11th - 12th, 2016 at the Colorado Convention Center in Denver,
    CO.

    RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who would like a glimpse into the fast-moving developments within the field.

    This year’s event drew a record number of attendees because of its lineup of renowned panel of experts, including…

    The Rocky Mountain Information Security Conference (RMISC) recently held its tenth annual conference on May 11th - 12th, 2016 at the Colorado Convention Center in Denver,
    CO.

    RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who would like a glimpse into the fast-moving developments within the field.

    This year’s event drew a record number of attendees because of its lineup of renowned panel of experts, including the high-profile keynote speaker John McAfee, who is currently running as the Libertarian Party candidate for president.

    McAfee pioneered commercial antivirus when he founded McAfee Anti Virus in 1987; he is considered one of the greatest, most controversial and outspoken minds when it comes to Information Security and privacy. Prior to McAfee Associates, John has held positions at NASA, Univac, Xerox, CSC & Lockheed.

    McAfee surprised those in attendance at the opening plenary by crashing the opening Ambassador's Keynote Panel, and we were lucky to have captured the event...

    Other authors
    See publication
  • Arlington CISO Dave Jordan on Why We're Losing the Cyberwar

    Cyber Defense Magazine - Special RSA Conference Edition

  • (ICS)2 Congress - ASIS Conference Speaker, Fall 2014

    Discussion about business skills that make Cyber Security professionals successful. Cyber Security is usually thought of as mainly a technical domain, yet it has a reach far outside just technical aspects. Hear from a panel of experts about what business skills are needed to overcome challenges often faced by security professionals. The discussion will benefit all security professionals.

    Other authors
    See publication
  • Contributor: Data Privacy, Information Security and Cyber Insurance Trends Report (3rd Annual Edition)

    Cyber Data Risk Managers

    This 3rd annual Cyber Data Risk Managers 2014 report, released on Data Privacy Day January 28, 2014, shows our commitment to data privacy and our continued support to help empower businesses and organizations to make the protection of privacy and data a great priority in their environments. Included in this report, are many invaluable insights and recommendations offered by Data Privacy and Information Security industry experts that will prove useful for businesses and organizations…

    This 3rd annual Cyber Data Risk Managers 2014 report, released on Data Privacy Day January 28, 2014, shows our commitment to data privacy and our continued support to help empower businesses and organizations to make the protection of privacy and data a great priority in their environments. Included in this report, are many invaluable insights and recommendations offered by Data Privacy and Information Security industry experts that will prove useful for businesses and organizations, regardless of industry or sector...

    See publication
  • Contributor: Infosec Institute

    Infosec Institute

    Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

    See publication
  • Author: TechTarget / SearchSecurity

    TechTarget

    Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

    See publication
  • Contributor: DATA PRIVACY, INFORMATION SECURITY AND CYBER INSURANCE TRENDS REPORT

    Cyber Data Risk Managers

    Cyber insurance, aka “privacy and security” insurance continues to evolve as many more
    businesses, organizations and risk managers are realizing that it can be used as a way to
    respond to a data breach and/or security incident and as a key component of an incident
    response plan.

    See publication
  • Security Flaws Exposed at Washington, D.C. Airports

    Network World

    The Metropolitan Washington Airport Authority (MWAA) earlier this year published a document to its website containing sensitive security information that terrorists could potentially have used to launch cyber and physical attacks against Reagan National and Dulles International airports in Washington, D.C. The document included a detailed map of Ronald Reagan Washington National Airport, a diagram of the entire electronic security system - including connection and protocol details for key…

    The Metropolitan Washington Airport Authority (MWAA) earlier this year published a document to its website containing sensitive security information that terrorists could potentially have used to launch cyber and physical attacks against Reagan National and Dulles International airports in Washington, D.C. The document included a detailed map of Ronald Reagan Washington National Airport, a diagram of the entire electronic security system - including connection and protocol details for key components - and an outline of which COTS hardware/software are used, down to the router brands and types...

    See publication
  • Indian Hackers Claim to Have U.S. Government Passwords

    NBC News

    The Indian hacker group that released Symantec anti-virus source code earlier this month now says it has more proof that Indian intelligence agencies are spying on the U.S. government. Infosec Island's Anthony M. Freed posted an article saying one of the Indian hackers, who calls himself "YamaTough," gave him 68 sets of usernames and passwords for U.S. government network accounts. YamaTough told Freed the account data is just a sample of the information the hacker group, the "Lords of…

    The Indian hacker group that released Symantec anti-virus source code earlier this month now says it has more proof that Indian intelligence agencies are spying on the U.S. government. Infosec Island's Anthony M. Freed posted an article saying one of the Indian hackers, who calls himself "YamaTough," gave him 68 sets of usernames and passwords for U.S. government network accounts. YamaTough told Freed the account data is just a sample of the information the hacker group, the "Lords of Dharmaraja," copied from Indian government servers...

    See publication
  • Contributor: SeekingAlpha

    SeekingAlpha

    Anthony M. Freed is a Global Communications executive and was formerly a security journalist who authored feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets. Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

    See publication

Projects

  • U.S. Security Journalist Delegation to Israel

    The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.

    The delegation was co-sponsored by the…

    The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.

    The delegation was co-sponsored by the government of Israel and the America-Israel Friendship League, whose mission is to strengthen the relationship between the people of the United States and Israel, by presenting to our AIFL Community members the inspiring virtues of Israel with emphasis on beyond-the-conflict topics.

    Throughout the visit, the leadership delegation focused on Israel’s cybersecurity eco-system, and the members met with Israeli security company CEOs such as Gil Shwed of Check Point Software Technologies, senior Israeli leaders such as PM Benjamin Netanyahu, Brigadier General (ret'd) Dr. Danny Gold, and other promising leaders in academia, industry, and defense.

    Other creators
    See project
  • Cyberwarzone

    The goal of Cyberwarzone is to provide the world a portal with global cyberwar information. The effort in getting this cyberwarfare information is hard. But as the internet is growing we need to get an global cyberwar & cybercrime monitoring system.

    https://www.facebook.com/Cyberwarzone

    Other creators
    See project
  • Cybersecurity Forum Panel Moderator at the Republican National Convention

    -

    Cleveland State University and the Cleveland-Marshall College of Law’s Cybersecurity and Privacy Protection Center together with Baldwin Wallace University hosted the nonpartisan Cyber Security Forum at the RNC Cybersecurity Forum. The event brought together technology and policy experts, lawmakers and delegates, to discuss innovative ways that the private sector, educational institutions and the government can collaborate to address one of the most serious economic and national security…

    Cleveland State University and the Cleveland-Marshall College of Law’s Cybersecurity and Privacy Protection Center together with Baldwin Wallace University hosted the nonpartisan Cyber Security Forum at the RNC Cybersecurity Forum. The event brought together technology and policy experts, lawmakers and delegates, to discuss innovative ways that the private sector, educational institutions and the government can collaborate to address one of the most serious economic and national security challenges facing the nation and develop effective and fair policies that balance security and privacy.

    https://www.law.csuohio.edu/academics/cybersecurity/rnc/speakers

    Panel: Cybersecurity and CyberWar: Technology and Policy Issues Affecting Our National Security

    This panel will provide an overview of the critical national security issues cybersecurity and the emerging cyberwarfare activities by nation states raise, including the growing tension between the privacy and security; why traditional approaches to national defense are inadequate; and the key issues that cybersecurity laws and policies should address to begin to counter these threats.

    Panel members: Anthony M. Freed (moderator), Dr. Steve Belovich, Maj. Joe Billingsley, Ira E. Hoffman, Col. Marc Jamison (ret'd), and Cdr. Bernadette Semple (ret'd).

    See project
  • Rocky Mountain Information Security Conference (RMISC) Ambassador and Keynote Panel Moderator

    -

    Event VIP Ambassador along with Javvad Malik, Jack Daniel, Jayson Street, DaveLewis, and Eddy Mize - with special guest John McAfee...

    See project

Honors & Awards

  • Winner - 17th Annual People's Choice Podcast Awards - Technology Category

    Technology Category

    The Malicious Life Podcast won the Technology Category honor at the 17th Annual People's Choice Podcast Awards. The People's Choice Podcast Awards is the longest running premier podcast awards event in the podcasting space open to shows worldwide. Nominees across all the categories included podcasts like ESPN Daily, NPR's This American Life, John Stewart, the FBI and DIA, tier one media like CBS and more - so we were in there with some heavy hitters! Votes cast for this year's awards numbered…

    The Malicious Life Podcast won the Technology Category honor at the 17th Annual People's Choice Podcast Awards. The People's Choice Podcast Awards is the longest running premier podcast awards event in the podcasting space open to shows worldwide. Nominees across all the categories included podcasts like ESPN Daily, NPR's This American Life, John Stewart, the FBI and DIA, tier one media like CBS and more - so we were in there with some heavy hitters! Votes cast for this year's awards numbered in the tens of millions for the 300 podcasts that were nominated.

  • U.S. Security Journalist Delegation to Israel - 2016

    http://aifl.org/

    The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.

    The delegation was co-sponsored by the…

    The America-Israel Friendship League (AIFL) co-hosted a twelve-member delegation representing prominent cybersecurity writers, journalists, practitioners, and researchers, at the Cybertech 2016 Conference in Tel Aviv. Among the goals for the participants in this 5-day delegation to Israel are: to facilitate a mutual exchange of information security expertise and to learn more about the latest trends driving the security industry in Israel.

    The delegation was co-sponsored by the government of Israel and the America-Israel Friendship League, whose mission is to strengthen the relationship between the people of the United States and Israel, by presenting to our AIFL Community members the inspiring virtues of Israel with emphasis on beyond-the-conflict topics.

    Throughout the visit, the leadership delegation focused on Israel’s cybersecurity eco-system, and the members met with Israeli security company CEOs such as Gil Shwed of Check Point Software Technologies, senior Israeli leaders such as PM Benjamin Netanyahu, Brigadier General (ret'd) Dr. Danny Gold, and other promising leaders in academia, industry, and defense.

Recommendations received

48 people have recommended Anthony M.

Join now to view

More activity by Anthony M.

View Anthony M.’s full profile

  • See who you know in common
  • Get introduced
  • Contact Anthony M. directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses