Javvad Malik

Opinions expressed by ICN authors are their own.

Javvad Malik is an award-winning information security consultant, author, researcher, analyst, advocate, blogger and YouTuber. He currently serves as a security advocate at AlienVault.

An active blogger, event speaker and industry commentator, Javvad is known as one of the industry’s most prolific influencers, with a signature fresh and light-hearted perspective on security.

Prior to joining AlienVault, he was a senior analyst with 451 Research providing technology vendors, investors and end users with strategic advisory services, including competitive research and go-to-market positioning. Prior to that, Javvad served as an independent security consultant, with a career spanning 12+ years working for some of the largest companies across the financial and energy sectors.

Javvad is an author and co-author of several books, including The CISSP Companion Handbook: A Collection of Tales, Experiences and Straight Up Fabrications Fitted Into the 10 CISSP Domains of Information Security and The Cloud Security Rules: Technology is Your Friend. And Enemy. A Book About Ruling the Cloud. He’s also the founder of the Security B-Sides London conference and a co-founder of Host Unknown with Thom Langford and Andrew Agnés.

Javvad has earned several professional certifications over the course of his career, including Certified Information Security Systems Professional (CISSP) and GIAC Web Application Penetration Tester (GWAPT). He’s also won numerous awards in recent years for his blogging, including the "2015 Most Entertaining Blog" and the "2015 Best Security Video Blogger" recognitions at the European Security Blogger Awards.

The opinions expressed in this blog are those of Javvad Malik and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Adapting to security’s new reality

Information security misconceptions

Information security misconceptions

Channeling my inner Billy Bragg, isn't it fair to say that nobody knows nothing anymore?

If time is money, what exactly is data?

If time is money, what exactly is data?

If you consider how much your data is worth to various parties and in varied contexts, then you’ll be in a better position to understand both its value and the extent to which it needs to be protected.

It’s not your parents’ SIEM

It’s not your parents’ SIEM

The SIEM (Security Information and Event Management) isn't dead: it just doesn't look like it used to and has evolved into a modern threat monitoring and detection solution.

Be afraid of the dark web – or learn to monitor it

Be afraid of the dark web – or learn to monitor it

How closely the dark web needs to be monitored depends on each organization’s own capabilities and appetite for risk.

If data is the new oil, then Equifax just caused a huge environmental disaster

If data is the new oil, then Equifax just caused a huge environmental disaster

Examining the Equifax breach, its long-lasting impact and the need for more – and better – regulation.

Putting the cyber in crime

Putting the cyber in crime

Javvad Malik, security advocate at AlienVault, explains how lower barriers and increased profits have lead to a surge in cybercrime.

Nothing new to (Wanna)Cry about

Nothing new to (Wanna)Cry about

Javvad Malik of AlienVault examines how the recent ransomware strain WannaCry is similar to past attacks, and why changes to regulations and business models are impacting the future of cybersecurity.

Is your company spending on the right security technologies?

Is your company spending on the right security technologies?

Here are three considerations that can help companies make the right decisions when it comes to investing in security technology.

Well-funded doesn't mean well-secured

Well-funded doesn't mean well-secured

Being able to buy security products doesn't mean your business is secure. You need an integrated, security technology strategy.

3 tips to improve threat detection and incident response

3 tips to improve threat detection and incident response

These three security controls are surefire ways to improve threat detection and incident response to hacks and data breaches.

Five ways cybersecurity is nothing like the way Hollywood portrays it

Five ways cybersecurity is nothing like the way Hollywood portrays it

Javvad Malik, AlienVault, takes a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies.

Load More