Tony Bradley

Spring, Texas, United States Contact Info
5K followers 500+ connections

Join to view profile

About

Tony Bradley is a master of content marketing and brand strategy with over two decades of…

Articles by Tony

See all articles

Activity

Join now to see all activity

Experience & Education

  • GTG.Online

View Tony’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • 2023-2024 SLED Cybersecurity Priorities Report

    NuHarbor Security

    This report is created to advise and empower SLED cybersecurity leaders. It provides data-driven insights from senior leaders, analysts, and experts, identifying trends and successes that are defining a new generation of cybersecurity visionaries.

    See publication
  • Prevent Checkmate: Executing an Effective CTEM Program

    Epiphany Systems

    Epiphany’s CTEM eBook is a free resource that explains how to use Continuous Threat Exposure Management to improve your cybersecurity strategy. It describes the elements that comprise a CTEM program and describes how the Epiphany Intelligence Platform automates and enables effective continuous threat exposure management.

    See publication
  • Ransomware: The True Cost to Business (2022)

    Cybereason

    Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second…

    Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second time, with 68% saying the second attack came less than a month later and threat actors demanded a higher ransom amount...

    Other authors
    See publication
  • Organizations at Risk: Ransomware Attackers Don’t Take Holidays

    Cybereason

    Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
    Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
    Show publication
    The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33%…

    Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
    Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
    Show publication
    The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a ransomware attack, a situation that can factor into employee job satisfaction and potential burnout. One surprising finding in the study included 70% of respondents confessing that they have been intoxicated while responding to a ransomware attack during a weekend or holiday, a risk factor that many organizations may not have accounted for in their incident response planning...

    Other authors
    See publication
  • Ransomware: The True Cost to Business (2021)

    Cybereason

    The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the…

    The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the end only exacerbates the problem by encouraging more attacks. Getting in front of the threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive ransomware before they can hurt the business.

    Other authors
    See publication
  • Unified Communications for Dummies

    For Dummies (Wiley)

    Discover what Unified Communications can do for your business

    In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.

    This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For…

    Discover what Unified Communications can do for your business

    In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.

    This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For Dummies introduces you to the many advantages this technology offers your business and shows you how to develop a strategy for bringing it about.

    Unified Communications is a new paradigm for working and communicating efficiently and collaboratively
    This book explains the features available with Unified Communications and how they can create new capabilities to drive customer satisfaction
    Shows how Unified Communications encompasses office and mobile phones, voicemail, instant messaging, fax, Internet phone calls, texting, and even Web conferencing
    Provides a step-by-step approach for creating a Unified Communications strategy
    Offers tips for improving the implementation process
    Shares real-world examples of how Unified Communications is being used today
    Unified Communications For Dummies shows you how to meet business needs with this emerging, cutting-edge solution.

    Other authors
    See publication
  • PCI Compliance (Understand and Implement Effective PCI Data Security Standard Compliance)

    Syngress

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or…

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
    *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data
    *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant
    *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs

    Other authors
    See publication
  • Essential Computer Security (Everyone's Guide to E-mail, Internet, and Wireless Security)

    Syngress

    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

    See publication
  • Hacker's Challenge 3

    McGraw-Hill / Osborne

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more…

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

    Other authors
    See publication

Organizations

  • Microsoft MVP

    -

    -

Recommendations received

More activity by Tony

View Tony’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tony directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tony Bradley in United States

Add new skills with these courses