Richard Henderson is Global Security Strategist at Absolute, where he is responsible for trend-spotting, industry-watching and idea-creating. He has nearly two decades of experience and involvement in the global hacker community and discovers new trends and activities in the cyber-underground.
He is a researcher and regular presenter at conferences and events, and was lauded by a former US DHS undersecretary for cybersecurity as having an "insightful view" on the current state of cybersecurity. He is also a skilled electronics hacker: he was one of the first researchers in the world to defeat Apple's TouchID fingerprint sensor on the iPhone 5S.
Richard can be found speaking at industry conferences including Gartner's Security and Risk Summit; he also provides media commentary for publications ranging from Wired to CSO.
Richard also helped edit colleague and friend Tyson Macaulay's latest book on IoT Security: RIoT Control: Understanding and Managing Risks and the Internet of Things. He is currently co-authoring a 2nd edition of Cybersecurity for Industrial Control Systems.
The opinions expressed in this blog are those of Richard Henderson and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Your organization might eventually fall victim to a data breach but creating checks and balances to maintain a layered data security approach can help you come out the other side with fewer losses.
A recent Twitter incident should be a great reminder for others on how one single person inside your organization can cause a significant incident with a lot of public exposure.
Hackers from around the globe are converging in the Nevada desert to celebrate DEF CON's 25th Anniversary.
Threat Abstraction and Modeling is an important piece of planning in the enterprise as it can be used as an approach to better secure software.