Education: CISSP (1996)
Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)
Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher
What malware do you hate the most? State sponsored.
Favorite activities? Reading and writing, and some arithmetic.
What is your golden rule for cyberspace? Don’t put anything on the Internet you wouldn’t want your mother to see.
When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.
Favorite computer game/activity? Reading Wikipedia.
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.
An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.
Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.
US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.
Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.
This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.
New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.
Wearable activity tracking devices like those made by Fitbit were one of the hottest gifts this past holiday season and it appears criminal hackers were paying attention, ESET’s Stephen Cobb reports.
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For
Virus Bulletin 2015 in Prague could be the biggest ever, a great place to discover the latest developments in malware protection and information security, and address issues like the infosec skills gap.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.
The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.
It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: “Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries”.
Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site