15 Posts

Kelly Ryver

Management and Strategy Consultant, IBM

    Kelly is a management and strategy consultant with over 20 years of consulting experience ranging from security analysis, to functional analysis to security architecture in the public, private, non-profit and defense sectors.

    Written By Kelly Ryver

    Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats

    As facial recognition technology advances, bad actors will have more biometric data with which to create deepfake images, videos, sounds and more. Is the security community prepared for this threat?

    It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

    Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

    Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security

    Chief information security officers (CISOs) shouldn't be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk.

    Lessons From the Cold War: Data Security Through Obscurity

    What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.

    Anti-I: The Future of AI-Generated Malware

    As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.

    Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

    Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

    Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

    During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.

    Funny Money: Exploring the Connection Between Bitcoin and Ransomware

    Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.

    Virtual Reality, Augmented Reality and Futuristic Threat Modeling

    Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.

    Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

    Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.