Paul Shomo

Opinions expressed by ICN authors are their own.

Prior to becoming an independent analyst, Paul Shomo was one of the engineering and product leaders behind the forensics software EnCase. In addition to his work in the digital forensics and incident response (DFIR) space, he developed code for OSes that still power many of today’s IoT devices. He is the co-editor of an upcoming special issue of the Journal of the Association of Computing Machinery (ACM).

The opinions expressed in this blog are those of Paul Shomo and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Navigating the AI hype in security: 3 dos and 2 don'ts

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

Data exchanges know all about you; soon they'll impact cybersecurity

Data exchanges know all about you; soon they'll impact cybersecurity

Our digital lives, physical locations and credit card usage are traded on exchanges. If there’s such a thing as “surveillance capitalism,” data exchanges are the closest thing to three letter intelligence agencies.

4 cybersecurity developments to watch in 2018

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

Law enforcement uses anti-virus software to recover suspect's web history

Law enforcement uses anti-virus software to recover suspect's web history

Let’s mainstream the idea that privacy is almost impossible in the face of digital forensics. Avast AV leaving behind a private browsing database, is a shocking illustration of this.

4 reasons forensics will remain a pillar of cybersecurity

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

Load More