Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.
Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.
It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET’s Cameron Camp looks explores the challenges of data security.
Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be ‘yes’ says ESET’s Cameron Camp.
This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.
It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET’s Cameron Camp.
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.
A referendum is to be held on Switzerland’s proposed surveillance law, a decision lauded by supporters of privacy. ESET’s Cameron Camp discusses further.
The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET’s Cameron Camp.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site