Birmingham, Michigan, United States
Contact Info
38K followers
500+ connections
About
Articles by Richard
-
If You Are an Industry Analyst, Please Stop Doing This.
If You Are an Industry Analyst, Please Stop Doing This.
By Richard Stiennon
Contributions
Activity
-
Who was on Nasdaq today? Super humbled to report that Cequence Security's fearless leader Ameya Talwalkar and our visionary investor Titanium…
Who was on Nasdaq today? Super humbled to report that Cequence Security's fearless leader Ameya Talwalkar and our visionary investor Titanium…
Liked by Richard Stiennon
-
It's fun to be solving cybersecurity problems that were not previously solvable. Cyera's growth has been amazing, and we're just getting…
It's fun to be solving cybersecurity problems that were not previously solvable. Cyera's growth has been amazing, and we're just getting…
Liked by Richard Stiennon
-
👀‼️Upwind is named as the fastest growing cyber vendor in H1 2024! 🚀 We are humbled by our rapid growth, which is a testament to our incredible…
👀‼️Upwind is named as the fastest growing cyber vendor in H1 2024! 🚀 We are humbled by our rapid growth, which is a testament to our incredible…
Liked by Richard Stiennon
Experience & Education
Publications
-
CyberWar and the Malware Blame Game
The Internet Advisor
Richard Stiennon and Lance James on Internet Advisor Radio Show discussing Cyberwar.
-
There Will Be Cyberwar
IT-Harvest Press
A history of the rise of network centric warfare and what that means for future cyberwar.
-
HeartBleed Discussion with Richard Stiennon
SecurityCurrent.com
Responsible disclosure is a burning issue it the world of software and security. If a security flaw is discovered by a researcher (sometimes called a hacker) what are the responsible actions the discoverer should take? There was a time when many security flaws were just published willy-nilly to a mail list or website. Researchers sought the fame and glory of being the first to uncover a serious flaw in Microsoft MSFT +0.54%, Adobe, or a network firewall.
Other authorsSee publication -
UP and to the RIGHT: Strategy and Tactics of Analyst Access
IT-Harvest Press
A guide for PR, AR, and marketing professionals to the world of analyst influence.
-
Richard Stiennon & Bill Conner Discuss State of the Cybersecurity Industry
IT Harvest
Richard Stiennon, security analyst with IT Harvest, sits down with Entrust CEO Bill Conner at RSA Conference 2012 to discuss the state of the cybersecurity industry. Topics included the SSL/CA market, plus the changes cloud and mobility are bringing to the IT landscape.
Other authorsSee publication -
Surviving Cyberwar
Rowman&Littlefield
Surviving Cyberwar is a history of state sponsored computer and network attacks from 1995 through Titan Rain and up to Google Aurora.
Patents
-
Elecromechanical release mechanism for a seat assembly
Issued US 5,348,373
A foundational patent that describes using an electric switch to release a seat adjuster.
-
Tubular seat back frame with U-shaped closed section reinforcement weld plate
Issued US 5,165,756
Optimize shear flow to provide best structural performance in a single sided recliner asymmetric seat back.
Courses
-
Intelligence in War
-
-
The Early Cold War (1945-1975)
-
-
The End of the Cold War (1985-1991)
-
Projects
-
Introduction to Hacking For Dummies, 5th Edition
Learn to hack your own system to protect against malicious attacks from outside
Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability…Learn to hack your own system to protect against malicious attacks from outside
Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, and security best practices.Other creatorsSee project -
Cyber Warfare: A Multidisciplinary Analysis (Routledge Studies in Conflict, Security and Technology)
I contributed the first chapter, titled "A Short History of Cyber Warfare" to this edited collection. Available April, 2015.
-
Book: There Will Be Cyberwar
-
The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars. Now on Amazon: http://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784
Honors & Awards
-
Top Cyber Pro
Top Cyber Pro
https://topcyberpro.com/richard-stiennon/
-
Top Cybersecurity Twitter Accounts to Follow in 2022
Security Scorecard
https://securityscorecard.com/blog/top-cybersecurity-twitter-accounts
-
Big Data & Analytics Hero
IBM
Richard Stiennon is a veteran of the security industry, and as an industry analyst he has gained years of experience advising enterprises, vendors and government agencies on their security strategies. Stiennon is the author of Surviving Cyberwar and There Will Be Cyberwar. Cyber attacks are a real and ever-present threat that behooves all of us to employ every tool, including analytics, to minimize cyber threats. http://www.ibmbigdatahub.com/big-data-analytics-hero/richard-stiennon
-
Four Cybersecurity Gurus to Follow on Twitter
FCW
http://fcw.com/articles/2014/09/30/4-cybersecurity-gurus-to-follow-on-twitter.aspx
2. Richard Stiennon (@stiennon and @cyberwar), executive editor of SecurityCurrent and founder of IT-Harvest
Stiennon is a regular commentator on cybersecurity for Forbes. His recent posts have examined the possibility of another leaker at the National Security Agency and have defended former NSA Director Gen. Keith Alexander for reportedly charging six to seven figures for his consulting…http://fcw.com/articles/2014/09/30/4-cybersecurity-gurus-to-follow-on-twitter.aspx
2. Richard Stiennon (@stiennon and @cyberwar), executive editor of SecurityCurrent and founder of IT-Harvest
Stiennon is a regular commentator on cybersecurity for Forbes. His recent posts have examined the possibility of another leaker at the National Security Agency and have defended former NSA Director Gen. Keith Alexander for reportedly charging six to seven figures for his consulting services.
Stiennon's articulation of what he has called the "IT security mindset" could help bridge a gap between policy-makers and cybersecurity gurus. When several IT commentators lashed out at White House Cybersecurity Coordinator Michael Daniel for recently arguing for a less technical approach to cybersecurity, Stiennon offered a measured response, saying, "It's the role that is at fault here, not Mr. Daniel or anyone else chosen to be the cybersecurity policy coordinator." -
Security Change Agent
Digital Gaurdian
One of the best security analysts on the globe.
by Phil Redman, VP Mobile Solutions & Strategy, Citrix
Richard Stiennon is known as one of the best security analysts on the globe. He is the Chief Research Analyst of IT-Harvest, a leading security research firm, and Executive Editor of securitycurrent, a security news and analysis community for CISOs.
https://digitalguardian.com/about/security-change-agents/richard-stiennon -
50 Most Powerful People in Networking
Network World Magazine
https://www.networkworld.com/article/2329284/the-50-most-powerful-people-in-networking.html?page=2
Number 30. Stiennon rocked the security world with his June report that said intrusion-detection systems (IDS) were "a market failure." Rare is the analyst that will tell it like it is about an emerging market, one chock-full of potential new analyst-report customers. His stance powerfully influenced IDS makers - forcing them to address their failings now or risk sales. The "IDS is dead"…https://www.networkworld.com/article/2329284/the-50-most-powerful-people-in-networking.html?page=2
Number 30. Stiennon rocked the security world with his June report that said intrusion-detection systems (IDS) were "a market failure." Rare is the analyst that will tell it like it is about an emerging market, one chock-full of potential new analyst-report customers. His stance powerfully influenced IDS makers - forcing them to address their failings now or risk sales. The "IDS is dead" report, as it is now widely known, was so influential that months after publication, in October, it prompted a roomful of prospective government IDS buyers to invite Stiennon to a face-off with a handful of IDS vendors.
Languages
-
French
-
Recommendations received
14 people have recommended Richard
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More