Richard Henderson

Opinions expressed by ICN authors are their own.

Richard Henderson is Global Security Strategist at Absolute, where he is responsible for trend-spotting, industry-watching and idea-creating. He has nearly two decades of experience and involvement in the global hacker community and discovers new trends and activities in the cyber-underground.

He is a researcher and regular presenter at conferences and events, and was lauded by a former US DHS undersecretary for cybersecurity as having an “insightful view” on the current state of cybersecurity. He is also a skilled electronics hacker: he was one of the first researchers in the world to defeat Apple’s TouchID fingerprint sensor on the iPhone 5S.

Richard can be found speaking at industry conferences including Gartner’s Security and Risk Summit; he also provides media commentary for publications ranging from Wired to CSO.

Richard also helped edit colleague and friend Tyson Macaulay’s latest book on IoT Security: RIoT Control: Understanding and Managing Risks and the Internet of Things. He is currently co-authoring a 2nd edition of Cybersecurity for Industrial Control Systems.

The opinions expressed in this blog are those of Richard Henderson and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

GDPR keeping you up? There’s another monster hiding under the bed…

What to do about internet-connected toys?

What to do about internet-connected toys?

The allure of interactive, intelligent companions for our children is real, and perhaps unavoidable in the long term. It's best to tread lightly and slowly.

The power of a single insider – lessons from Twitter

The power of a single insider – lessons from Twitter

A recent Twitter incident should be a great reminder for others on how one single person inside your organization can cause a significant incident with a lot of public exposure.

Why DEF CON still matters 25 years later

Why DEF CON still matters 25 years later

Hackers from around the globe are converging in the Nevada desert to celebrate DEF CON's 25th Anniversary.

Understanding the basics of threat abstraction and modeling

Understanding the basics of threat abstraction and modeling

Threat Abstraction and Modeling is an important piece of planning in the enterprise as it can be used as an approach to better secure software. Spending some time during your planning stages thinking about threats and potential...

Load More