13 Posts

Kelly Ryver

Management and Strategy Consultant, IBM

Kelly is a management and strategy consultant with over 20 years of consulting experience ranging from security analysis, to functional analysis to security architecture in the public, private, non-profit and defense sectors.

Written By Kelly Ryver

Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security

Chief information security officers (CISOs) shouldn't be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk.

Lessons From the Cold War: Data Security Through Obscurity

What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.

Anti-I: The Future of AI-Generated Malware

As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.

Funny Money: Exploring the Connection Between Bitcoin and Ransomware

Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.

Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.

Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.

Insider Threats, Industrial Sabotage and Game Theory: Part 2

When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.

Children’s Health Care, Patient Records and Black Market Identity Theft

Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.