InSecurity
InSecurity
Apr 22, 2019
The BlackBerry Cylance 2019 Threat Report
48 min

The BlackBerry Cylance 2019 Threat Report

 

The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year Cylance shares this report in the hope that you will put it to good use in our collective ght against the rising tide of cyber attacks worldwide.

The BlackBerry Cylance 2019 Threat Report provides unique findings drawn from our consulting engagements, threat research and intelligence efforts, and through feedback provided by Cylance customers. We share this information with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.

Join Matt Stephenson as he chats with Aditya Kapoor, Jim Walter and Tom Bonner about the cybersecurity trends, topics, and innovations that dominated the past year.

The BlackBerry Cylance panel of experts offer additional insights into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.

About Aditya Kapoor

 

Aditya Kapoor is Head of Security Research and Innovation at Cylance. He joined Cylance three years ago as and is passionate about creating technologies that drive innovative features within products. He is currently focused on driving deeper program analysis for supercharging ML models, firmware security and analyzing current threat trends to drive innovative engineering solutions.

Aditya speaks regularly at various conferences and firmly believes in the common cause of the security industry. Previously Aditya worked at McAfee/Intel for more than ten years as Research Architect where he reverse engineered malware, as well as designed several product technologies.

About Jim Walter

 

Jim Walter is a Senior Security Researcher with Cylance. He focuses on next-level attacks, actors, and campaigns as well as 'underground' markets and associated criminal activity. 

Jim is a regular speaker at cybersecurity events and has authored numerous articles, whitepapers and blogs specific to advanced/low-level threats. He joined Cylance following 17 years at McAfee/Intel Security running their Advanced Threat Research and Threat Intelligence teams and content streams.

About Tom Bonner

 

Tom Bonner (@thomas_bonner) is Director of Threat Research at Cylance. He has over 17 years' experience in the cyber security/anti-malware industry as an analyst, software developer and manager.

As an experienced cybersecurity professional, that’s all we could get out of him. We feel lucky to have gotten that much.

About Matt Stephenson

 

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceT 

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as SpotifyStitcherSoundCloudI Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

More episodes
Search
Clear search
Close search
Google apps
Main menu