Supply‑chain attacks: When trust goes wrong, try hope?
How can organizations tackle the growing menace of attacks that shake trust in software?
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
How can organizations tackle the growing menace of attacks that shake trust in software?
Cameron Camp and Tony AnscombeHow do you balance the right to repair with the requirement to remain secure?
Cameron CampWhen a breach captures a part of us that is unchangeable, does it mean that we have allowed technology to pry too deeply into our lives?
Cameron Camp and Aryeh GoretskyWhat happens when you try to opt out of e-health to avoid issues in the event of a breach?
Cameron CampWhat can municipalities do to better protect their water supply systems?
Cameron CampYour ‘networked computer on wheels’ has a privacy problem – when it comes to your data, you may not really be in the driver’s seat
Cameron CampNew mesh Wi-Fi routers may be the answer to your wireless signal woes, but how about your privacy and security?
Cameron CampAs Election Day draws near, here's a snapshot of how this election cycle is faring in the hands of the would-be digitally meddlesome
Cameron CampWhy are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor.
Cameron CampYou don’t need a degree in cybersecurity or a bottomless budget to do the security basics well – here are five things that will get you on the right track
Cameron CampIt’s easy to reset your password or PIN after a data breach. But reset your face? Not so much.
Cameron CampWith the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
Cameron CampAs work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.
Aryeh Goretsky and Cameron CampRemote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them
Cameron CampAs the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks
Cameron CampAnd how would you know if the algorithm was tampered with?
Cameron CampWhat the human battle against biological viruses can teach us about fighting computer infections – and vice versa
Cameron CampNo more default logins on new IoT devices if UK legislators get their way
Cameron CampAs software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
Cameron CampNo one has a road map for securing a connected city – but there should be a whole atlas of such maps
Cameron Camp