Breach

A breach, often referred to as a data breach or security breach, is an incident where confidential, protected, or sensitive information is accessed, disclosed, or taken without authorization. This can include incidents where data is stolen, copied, transmitted, viewed, or used by an individual unauthorized to do so. Data breaches can involve various types of information, including personal data, financial data, trade secrets, or any other type of information that is considered confidential. Breaches can occur for various reasons, such as hacking attacks, employee error, lost or stolen devices, or insider threats. The consequences of a data breach can be severe, including financial losses, damage to reputation, legal repercussions, and a loss of trust among customers or users.

Recent Blog Posts

Creating ERIN: The Rise of a Fully Interactive Virtual Receptionist

Creating ERIN: The Rise of a Fully Interactive Virtual Receptionist

Join me on a nostalgic journey recapping the pioneering work my team and I did in 2015-2016, as we created ERIN, a groundbreaking virtual receptionist that captured public and media attention. Dive into the details of her creation, the challenges we overcame, and the successes we celebrated.

Announcing My Fellowship with Mission Critical

Announcing My Fellowship with Mission Critical

I am excited to announce that I have become a fellow with Mission Critical, an organization dedicated to securing the U.S.'s critical infrastructure sectors. This role complements my ongoing work at ICIT, contributing to enhancing our nation's security and resilience.

Insider Threats and AI: A Panel Recap from Austin's Startup Week

Insider Threats and AI: A Panel Recap from Austin's Startup Week

Today, I joined a panel at Austin Startup Week to discuss "How Unsupervised Neural Networking Roots Out Insider Threats." The conversation took place at the Capital Factory here in Austin, Texas—an ideal setting for a forward-thinking cybersecurity discussion.

"Do You Have a Safe Word Yet?" A Call to Arms Against Deep Fake Voice Attacks

"Do You Have a Safe Word Yet?" A Call to Arms Against Deep Fake Voice Attacks

In the digital age, we've seen a steady evolution of threats, but none perhaps as chilling as the rise of deep fake voices and videos. Malicious actors can, with relative ease, use voice technology to mimic someone's voice and use it in criminally exploitative ways—from convincing others to take potentially dangerous actions, to making fraudulent payments, or opening gaps in security. This is a threat too severe to overlook. So, how do we safeguard ourselves in a landscape where our ears can't always be trusted?

Join Me at Austin's Startup Week: A Deep Dive into Insider Threats and Neural Networking

Join Me at Austin's Startup Week: A Deep Dive into Insider Threats and Neural Networking

Austin Startup Week, since its inception in 2011, has always been a vibrant tapestry of Austin's entrepreneurial spirit. A unique confluence of entrepreneurs, local leaders, and enthusiasts, it offers a rich platform to connect, collaborate, and grow. This year marks the 13th iteration of this celebrated event, which will span from November 6-10, 2023. From enlightening sessions, hands-on workshops, to dynamic startup showcases and networking mixers, Austin Startup Week promises to be an engaging experience. To all those who celebrate the spirit of innovation and entrepreneurship, I wholeheartedly encourage you to register and be a part of this distinctive celebration of Austin's diverse community of trailblazers.

Battle of the Minds: My Experience at the Texas Cyber Summit

Battle of the Minds: My Experience at the Texas Cyber Summit

I attended the Texas Cyber Summit for the first time this year, held at the Marriott in downtown Austin from September 28th to September 30th. Overall, I thoroughly enjoyed the event and am already planning to return next year.