Javvad Malik is an award-winning information security consultant, author, researcher, analyst, advocate, blogger and YouTuber. He currently serves as a security advocate at AlienVault.
An active blogger, event speaker and industry commentator, Javvad is known as one of the industry's most prolific influencers, with a signature fresh and light-hearted perspective on security.
Prior to joining AlienVault, he was a senior analyst with 451 Research providing technology vendors, investors and end users with strategic advisory services, including competitive research and go-to-market positioning. Prior to that, Javvad served as an independent security consultant, with a career spanning 12+ years working for some of the largest companies across the financial and energy sectors.
Javvad is an author and co-author of several books, including The CISSP Companion Handbook: A Collection of Tales, Experiences and Straight Up Fabrications Fitted Into the 10 CISSP Domains of Information Security and The Cloud Security Rules: Technology is Your Friend. And Enemy. A Book About Ruling the Cloud. He's also the founder of the Security B-Sides London conference and a co-founder of Host Unknown with Thom Langford and Andrew Agn?s.
Javvad has earned several professional certifications over the course of his career, including Certified Information Security Systems Professional (CISSP) and GIAC Web Application Penetration Tester (GWAPT). He's also won numerous awards in recent years for his blogging, including the “2015 Most Entertaining Blog” and the “2015 Best Security Video Blogger” recognitions at the European Security Blogger Awards.
The opinions expressed in this blog are those of Javvad Malik and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
The cloud has made its way into everyday vocabulary; even non-tech startups and consumers have an awareness of cloud computing and its impact. As it’s shifted the technology landscape, it’s also impacted the security landscape – not just for co...
The SIEM (Security Information and Event Management) isn't dead: it just doesn't look like it used to and has evolved into a modern threat monitoring and detection solution.
How closely the dark web needs to be monitored depends on each organization’s own capabilities and appetite for risk.
Examining the Equifax breach, its long-lasting impact and the need for more – and better – regulation.
How lower barriers and increased profits have lead to a surge in cybercrime.
Examining how the recent ransomware strain is similar to past attacks, and why changes to regulations and business models are impacting the future of cybersecurity.
Many organizations still struggle to implement the right security tools to manage and mitigate risk. Here are three considerations to help you make the right decisions.
3 tips to develop and implement an integrated, security technology strategy despite disparate business units with varying priorities