10 Posts

Kelly Ryver

Management and Strategy Consultant, IBM

Kelly is a management and strategy consultant with over 20 years of consulting experience ranging from security analysis, to functional analysis to security architecture in the public, private, non-profit and defense sectors.

Written By Kelly Ryver

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.

Funny Money: Exploring the Connection Between Bitcoin and Ransomware

Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.

Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.

Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.

Insider Threats, Industrial Sabotage and Game Theory: Part 2

When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.

Children’s Health Care, Patient Records and Black Market Identity Theft

Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.

Insider Threats, Industrial Sabotage and Game Theory

Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.

The Multitude of Threat Vectors Vehicle Area Networks Create

The vehicle area networks used by autonomous vehicles will need to protected with the most sophisticated security measures available.

A Future Full of Drones — and the Advanced Threats They Present

Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.