| CARVIEW |
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Timmins, Ontario, Canada
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
2K followers
500+ connections
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jason
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jason
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
Sign in to view Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
CyberMetrix turns 10 today!!! And my what a decade it has been!!! 🫨 🙏 I've been a self-funded entrepreneur all of my life. My first hustle was at…
CyberMetrix turns 10 today!!! And my what a decade it has been!!! 🫨 🙏 I've been a self-funded entrepreneur all of my life. My first hustle was at…
Liked by Jason Soroko
-
In our ongoing Root Causes Podcast series on what AI will look like in 1000 days, Jason Soroko and I discuss the spread of a new business process…
In our ongoing Root Causes Podcast series on what AI will look like in 1000 days, Jason Soroko and I discuss the spread of a new business process…
Liked by Jason Soroko
-
Sectigo was on the ground in Grapevine this week at Gartner's Identity & Access Management conference, connecting with industry leaders, exploring…
Sectigo was on the ground in Grapevine this week at Gartner's Identity & Access Management conference, connecting with industry leaders, exploring…
Liked by Jason Soroko
Experience & Education
-
Sectigo
****** ******
-
**** ****** *******
********* ******** *** *******
View Jason’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Volunteer Experience
-
Photographer
Timmins Humane Society
- Present 14 years
Animal Welfare
Providing promotional photographic services for animals in need. Also volunteering to photograph pets for fundraising activities.
Publications
-
The climate of North America and adjacent ocean waters ca. 6 ka
Canadian Journal of Earth Sciences
See publicationThe climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for…
The climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for continental western North America. Contrary to this, a reconstruction of the distribution of Sphagnum-dominated peatlands in western Canada indicates that they were located north of their modern distribution, suggesting warmer and (or) drier conditions at 6000 BP. This interpretation is strengthened by observations of lower lake levels at 6000 BP in western Canada. This drier climate may have been associated with warmer conditions as indicated by the quantitative climate reconstructions. In general, eastern North America was drier, while western North America was warmer and drier at 6 ka compared to the present. A model of vegetation and carbon storage, when forced using 6 ka Canadian Climate Model and pollen-based climate reconstructions, showed an increase in area covered by boreal forest, extending north and south of the present location. This was not, however, verified by the fossil data. Additionally, the model showed little total change in carbon storage at 6 ka in the terrestrial biosphere. Estimated sea surface temperatures off eastern Canada suggest warmer surface waters at 6 ka, in agreement with reconstructions based on terrestrial records from the eastern seaboard.
-
Creation of a Fixed Route Scheduling Database by the Precision Merging of Schedule, Bus Stop and Base Map Data Sets to Support Scheduling Operations
ESRI Proceedings
See publicationThe project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments…
The project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments and other governmental entities. Discussion will include the resulting procedures, route model, turn table modifications and AML™ tools developed to create routes and sequence bus stops and turn points.
Patents
-
METHOD AND APPARATUS FOR PROVIDING VEHICLE SECURITY
Issued US US2016012653 (A1)
See patentApparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states…
Apparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states include, for example, to disallow all diagnostic system access or to allow diagnostic access for servicing.
Courses
-
Administration Essentials for Experienced Admins (SalesForce.com)
ADM 211
-
Apex & Visualforce Controllers (SalesForce.com)
DEV 501
-
Architecting Highly Secure Applications on Amazon AWS (Trend Micro)
Amazon AWS re:invent 2013
-
Building Applications with Force.com (SalesForce.com)
DEV 401
-
Designing Secure Protocols And Intercepting Secure Communication: Moxie Marlinspike
Black Hat 2013
-
ESRI ArcGIS
-
-
Hunting with Mandiant Incident Response: Mandiant
MIRCon 2013
-
IBM Cognos Authoring Reports with Multidimentional Data
-
-
IBM Cognos BI Administration
-
-
IBM Cognos Design and Develop Models
-
-
IBM Cognos Report Studio
-
-
IBM Cognos TM1 Multidimentional
-
-
Jailbreaking iOS: Jay Freeman - Saurik
JailbreakCon 2013
-
Java
-
-
Mandiant Incident Handling for the Enterprise: Mandiant
Countermeasures 2012
-
Mobile Hacking II: HotWan
Black Hat 2013
-
Modern Botnets: Ken Baylor
Black Hat 2012
-
Powershell for Professionals: Carlos Perez
DerbyCon 2012
-
SANS: Advanced Exploit Development
SEC710
-
SANS: Hacker Techniques, Exploits & Incident Handling
SEC 504
-
SANS: Law of Data Security and Investigations
LEG523
-
SANS: Mobile Device Security and Ethical Hacking
SEC575
-
SCADA Security Training: Red Tiger Security
SANS Barcelona 2012
-
SQL Server BI
-
-
Tactical Exploitation: Attack Research
Black Hat 2012
Projects
-
Webinar - Ensuring a Trusted Internet of Things - Engineers Australia
- Present
See projectWe describe a security approach that unlocks business value by enabling secure access to IoT data. The intent is to ensure the right security level for every device, application, system and user. We ensure that data is usable only by authorized devices, applications and users. This allows you to create trusted IoT ecosystems and safeguard the flow of data across your infrastructure.
-
Speaker - InfoSec Netherlands
- Present
-
Implications of Malware Series
See projectSeries of 5 Webinars.
All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.
The Implications of Malware Webinar Series is designed to help you prevent malware…Series of 5 Webinars.
All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.
The Implications of Malware Webinar Series is designed to help you prevent malware infection/intrusion through education. Join us and discover how the most damaging forms of malware work, and how, by leveraging Entrust’s Government Solutions and Professional Services, you can protect yourself and your colleagues. -
Speaker - 2nd Annual Technology & Innovation - The Future of Security in Financial Services
See projectPlacing Identity at the Centre of Cyber Security
• What are the fundamental weaknesses in desktop operating systems which are abused by attackers?
• Leveraging mobile platforms to enhance security and increase user experience
• Why mobile operating systems are more secure than desktop operating systems
• Zeus Virus Demonstration: learn how key-logging malware and fundamental Windows functionality caught many unawares -
Product Innovation
- Present
Product Innovation at Entrust Datacard
-
eCrime Europe - November 2013
See projectSpeaker presentation on leveraging mobile devices. Explanation of malware techniques, multifactor authentication.
-
Customer Visit Demonstrations / Webinars
- Present
See project-Ongoing customer visits, globally.
-Demonstrations of malware, and how to mitigate malware with Entrust products including mobile smart credential.
Webinars have been presented for:
SC Magazine
BankInfoSecurity
BrightTALK -
Marketing and product management thought leadership - Security
- Present
Ongoing thought leadership for marketing and product management.
-
Mobile Security
- Present
iOS and Android platform security assessments. Supporting product management, marketing and R&D with information regarding mobile architectures, especially security.
-
London, UK Customer Roadshow 2013
-
See projectThe London Cybersecurity Forum was a great success. Attendees gained insight from the world's most trusted security experts, including Sir Dick Evans, former BAE chairman; Andrew Pinder, former government eEnvoy; and Entrust president and CEO Bill Conner.
-
Washington, DC Customer Roadshow
-
See projectJoin the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central…Join the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central Intelligence Agency, will deliver the keynote presentation, "Defining the Legal and Ethical Boundaries of the Cyber Frontier."
This half-day event will explore real examples of the latest malware attacks — including session-riding, key-logging and more — and discuss how to properly combat highly targeted attacks.
More activity by Jason
-
AI prompt injections: Follow guidance but don’t expect it to be fully mitigated. I’m quoted in: https://lnkd.in/eDjVDYqt
AI prompt injections: Follow guidance but don’t expect it to be fully mitigated. I’m quoted in: https://lnkd.in/eDjVDYqt
Shared by Jason Soroko
-
Following up on our list of top 5 PQC vanguards, in this Root Causes Podcast episode Jason Soroko and I detail the top 5 PQC laggards. Audio:…
Following up on our list of top 5 PQC vanguards, in this Root Causes Podcast episode Jason Soroko and I detail the top 5 PQC laggards. Audio:…
Liked by Jason Soroko
-
AI agents become a new privileged layer. I’m quoted in: https://lnkd.in/eDNjKi5C
AI agents become a new privileged layer. I’m quoted in: https://lnkd.in/eDNjKi5C
Shared by Jason Soroko
-
Jason Soroko and I detail the top ten groups inside the organization who introduce rogue certificates into IT organizations. Join us on the Root…
Jason Soroko and I detail the top ten groups inside the organization who introduce rogue certificates into IT organizations. Join us on the Root…
Liked by Jason Soroko
-
Manual SSL management isn’t just inefficient, it also introduces real security and operational risk. Our latest article on Effortless SSL automation…
Manual SSL management isn’t just inefficient, it also introduces real security and operational risk. Our latest article on Effortless SSL automation…
Liked by Jason Soroko
-
This is what future cryptographic talent looks like! Awesome energy and teamwork from our young crew at the CTF. Fantastic to see. #Crypto4A…
This is what future cryptographic talent looks like! Awesome energy and teamwork from our young crew at the CTF. Fantastic to see. #Crypto4A…
Liked by Jason Soroko
-
Great couple of days in Paris , customers , Partners and employees are excited about the present and most importantly about the future . François…
Great couple of days in Paris , customers , Partners and employees are excited about the present and most importantly about the future . François…
Liked by Jason Soroko
-
Tech watchers tend to conflate the many quantum technologies under development right now. In this Root Causes Podcast episode Jason Soroko go…
Tech watchers tend to conflate the many quantum technologies under development right now. In this Root Causes Podcast episode Jason Soroko go…
Liked by Jason Soroko
-
If you work with certificates or digital identity, don’t miss these 2026 PKI trends. Some of these changes are already in motion and the industry…
If you work with certificates or digital identity, don’t miss these 2026 PKI trends. Some of these changes are already in motion and the industry…
Liked by Jason Soroko
-
SSL/TLS certificate lifespans are getting shorter, dropping from 398 days to just 47 by 2029, and forcing CISOs to rethink automation and inventory…
SSL/TLS certificate lifespans are getting shorter, dropping from 398 days to just 47 by 2029, and forcing CISOs to rethink automation and inventory…
Liked by Jason Soroko
-
Jason Soroko and I discuss quantum clocks and their potential role in cryptography on the Root Causes Podcast. Audio: Video:…
Jason Soroko and I discuss quantum clocks and their potential role in cryptography on the Root Causes Podcast. Audio: Video:…
Liked by Jason Soroko
-
Jason Soroko and I share our PKI predictions for 2026 on the Root Causes Podcast. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA…
Jason Soroko and I share our PKI predictions for 2026 on the Root Causes Podcast. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA…
Liked by Jason Soroko
-
You can’t manage what you don’t know you have including firewalls. Quoted in: https://lnkd.in/gEZjffDB
You can’t manage what you don’t know you have including firewalls. Quoted in: https://lnkd.in/gEZjffDB
Shared by Jason Soroko
-
Jason Soroko explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems on the Root…
Jason Soroko explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems on the Root…
Liked by Jason Soroko
-
AI is evolving… and so should our methods of securing it. Sectigo Senior Fellow Jason Soroko explains why it’s time to start signing AI models…
AI is evolving… and so should our methods of securing it. Sectigo Senior Fellow Jason Soroko explains why it’s time to start signing AI models…
Liked by Jason Soroko
View Jason’s full profile
-
See who you know in common
-
Get introduced
-
Contact Jason directly
Other similar profiles
Explore more posts
-
Communications Security Establishment Canada | Centre de la sécurité des télécommunications Canada
#CyberAlert | Critical Microsoft SharePoint Server vulnerability On July 19, Microsoft published guidance for a critical SharePoint vulnerability (CVE-2025-53770). The Cyber Centre is aware of exploitation happening in Canada. https://lnkd.in/eXMDC-dU Unauthorised attackers are able to execute code over a network by deserializing untrusted data in on-premises SharePoint Servers. (SharePoint Online in Microsoft 365 is not impacted.) A patch is currently not available but Microsoft is working to release a security update. The Cyber Centre strongly recommends that organizations take the following mitigation steps: - Enable Antimalware Scan Interface (AMSI) integration in SharePoint Server. - Deploy Microsoft Defender Antivirus across all SharePoint servers. - Disconnect the server from the internet if AMSI cannot be enabled. - Deploy Defender for Endpoint to detect and block post-exploit activity. Follow the mitigation and detections from Microsoft and continually monitor for any released patches. In addition, we strongly recommend that organizations review and implement our Top 10 IT Security Actions: https://lnkd.in/dAHDgpTW Should activity matching the content of this alert be discovered, organizations are encouraged to report via the My Cyber Portal (https://lnkd.in/gTtc3W4D) or contact us directly by email (contact@cyber.gc.ca).
117
6 Comments -
MITRE
MITRE ATT&CK v18 lands today with a groundbreaking update to ATT&CK's threat detection taxonomy. This restructuring—announced during ATT&CKcon by MITRE ATT&CK defense lead Lex Crumpton—will help cybersecurity teams better connect the dots across adversary behaviors, enabling more effective and informed defenses. Read more on Inside Cybersecurity: https://spklr.io/6047BzpN3 #ATTACKcon #Cybersecurity #ThreatInformedDefense #MITREattack
327
6 Comments -
Recorded Future
How the NVD funding near-miss exposed the risk of single-source intelligence. The cybersecurity world received an abrupt wake up call to the issue of using single-source vulnerability intelligence last week. This new blog analyzes the cracks exposed and how to prepare for a future when single-source intelligence is now a realistic business risk to organizations. Check out the details: https://bit.ly/3EiG88J #CVE #NVD #vulnerabilityintelligence
35
1 Comment -
Kandji
Kandji is announcing behavioral detections today, a powerful new capability in Kandji Endpoint Detection & Response (EDR) that analyzes process behaviors in real-time. This new approach layers over Kandji EDR’s existing static file analysis and checksum-based detections. By monitoring and analyzing the actual behavior of processes on endpoints, this new feature can identify potential threats—even if they’ve never been seen before. We are excited about this latest release, and will continue to develop new behavioral detection patterns as new threats emerge to help keep you and your users protected. More on behavioral detections here: https://lnkd.in/e7SRTyNs
85
-
Claroty
💡 On Nexus, George V. Hulme explains why vulnerability scoring models such as CVSS 3.1 and CVSS 4.0 must evolve to include contextual information that helps network and systems analysts and security teams better prioritize remediation, mitigation, and patching processes. https://hubs.ly/Q03L0SZj0
27
-
Apiiro
🌟 Introducing AI-Powered Software Graph Visualization from Apiiro 🌟 Continuous, accurate threat modeling is now a reality Tired of looking at static diagrams and basing security decisions on outdated assumptions? Apiiro’s new Software Graph provides a real-time, interactive map of your application architecture, from code to runtime. https://lnkd.in/dh8a7xxT Automatically generated using Deep Code Analysis (DCA) and runtime context, the graph enables teams to: 🔍 Visualize relationships between APIs, services, data models, secrets, and dependencies 🚨 Identify critical risks like sensitive data exposure, internet-exposed APIs, and blast radius of vulnerable components ⚡ Get visual, context-rich answers to targeted security questions in seconds 📊 Prioritize and remediate based on actual business impact, not generic scoring Software Graph gives security teams a live, queryable risk model, fully integrated with your existing security workflows. Say goodbye to manual reviews and hello to real-time, risk-aware visibility. 👉 See it in action – Watch our demo video, and get a live demo tailored to your environment: https://lnkd.in/gDihbKTb #AppSec #ASPM #ThreatModeling #SoftwareArchitecture #Apiiro
52
1 Comment -
Cisco Security
While defenders rush to contain, adversaries are already moving on, using the noise as air cover for their next attack. Instead of reacting, defenders can turn this moment into an opportunity: - Hide exposed systems with Zero Trust Access - Close doors with intrusion prevention and WAFs - Detect behaviorally with AMSI and advanced endpoint protection - Automate risk reduction through segmentation and smart policy controls This is how defenders take back the advantage. Read about SharePoint vulnerabilities and more in the blog: https://cs.co/6042Axkgg
20
-
Kiteworks
Half of defense contractors are still unprepared for CMMC 2.0. Our 2025 Data Security and Compliance Risk: Annual Survey Report reveals critical governance gaps across the defense industrial base: ✅ Only 56% have fully implemented end-to-end encryption ✅ Just over 50% maintain centralized governance processes ✅ 64% track AI content but only 17% have technical AI governance frameworks ✅ 46% lack visibility into third-party ecosystems creating direct compliance risks As our CISO and SVP of Operations, Frank Balonis, states, “Without proper governance controls in place, organizations cannot demonstrate the comprehensive CUI protection that CMMC requires.” 🔗 Read the full report to see the actions defense contractors must take to achieve CMMC readiness. https://hubs.ly/Q03Hr3dv0 #CMMC #Cybersecurity #DataGovernance #Kiteworks2025AnnualReport
115
19 Comments -
Belkasoft
🧠 Looking to expand your DFIR toolkit? We’re sharing a hand-picked list of blogs and training resources recently highlighted by Dr. Ashar Neyaz—each one packed with practical tips, tools, and investigative insights for digital forensics professionals: 🔹 OneDrive evolution & schema updates https://lnkd.in/edcVqT-c 🔹 Portable forensics with Raspberry Pi https://lnkd.in/eHeAsuzN 🔹 Open-source intelligence tools https://lnkd.in/eGYRQb7P 🔹 Email and mobile forensics blog https://lnkd.in/eiu9uxHx 🔹 Incident response training https://lnkd.in/ekGNi9Ae 🔹 Belkasoft’s digital forensics training https://lnkd.in/ezVV3PSh 🔹 Memory forensics articles and research https://lnkd.in/emSnTK9s 🔹 Timeline analysis in memory forensics https://lnkd.in/epd3M-h3 Explore more on our blog: https://lnkd.in/eCbnniPT 💬 Got a favorite source or blog of your own? Share it in the comments—we’re always on the lookout for new resources to learn from. #DFIR #CyberSecurity #DigitalForensics
44
-
Rockwell Automation
What happens when you pair the high-level guidance of NIST CSF with the real-world tactics of MITRE ATT&CK? You get a strategy that not only aligns to regulatory frameworks, but actively identifies, responds to, and mitigates OT threats in real time. In this new blog post, we break down how to layer these two models for a more resilient OT security posture, without overcomplicating your operations. Learn more here: https://rok.auto/45Bjeob #OTSecurity #IndustrialCybersecurity #NIST #MITREATTACK
53
2 Comments -
Michael A. Echols MBA CISSP
Max Cybersecurity LLC
The CVE Program — as we know it — just almost expired. MITRE’s contract to run the Common Vulnerabilities and Exposures (CVE) Program was to end April 16, 2025. That’s the system we all rely on to coordinate software vulnerability disclosures. No #CVE means no standardized alerts, no shared language for tracking threats, and a whole lot of chaos for defenders. Over 2,800 CVEs are issued monthly. Without continuity, threat actors get a head start — and defenders are stuck making up names like “That-One-Unpatched-Thing-In-The-Corner.” #CVE #Cybersecurity #OTSecurity #MITRE #CISA #MaxAI #CyberIn60Seconds #Resilience #mikeechols Leslie EcholsChuck BrooksChloe BurkeLes McCollum II, MPS-CRMCalvin Nobles, Ph.D.Danyetta Fleming Magana, CISSP, F. ISRMLaszlo Gonc, CISSP, QTESean C. Robert CraneLester Lewis, MBA#CISAntonio "T" ScurlockRoy White, MBA, PMPHoward TsaiTamika McCree ElhilaliJeffrey M. Vinson, Sr CISSP, CCISO, CIPP, NSA IAM-IEMGuy WaltonGotham ArtistsMatthew DimmickTim CooganJohn B MooreDeborah PageAdam Mohamed#aws #informationsharing #mikeechols
37
3 Comments -
Binary Defense
What separates high-fidelity detections from the noise? In this roundtable, our Detection Engineers shared how a threat-informed, attacker-first mindset shapes the way Binary Defense builds, validates, and prioritizes detections. Learn how we: Evolve alongside adversary tradecraft Define alerts vs detections Boost detection engineering efficiency with AI Watch now to see how our Threat Informed Detection Engineering (TIDE) approach delivers clarity where it counts. https://lnkd.in/gCNpZMRE
16
-
Magnet Forensics
Modern enterprises face complex challenges with distributed teams and remote work. Magnet Nexus makes it easier, faster, and more secure to collect forensic data from multiple endpoints, no matter where they are. Nexus offers multi-endpoint collection across #Windows, #macOS, and #Linux, providing cloud-based scalability and fast processing, ensuring efficient operations. Learn more about how Magnet Nexus can revolutionize your #DigitalInvestigations and how you can try it for free: https://ow.ly/EOtw50UL33G #DFIR #Cybersecurity
28
-
Horizon3.ai
In the latest blog post from the Horizon3.ai Attack Team, they share IOCs for CVE-2025-2825, an authentication bypass affecting #CrushFTP. #NodeZero users: you can now run a Rapid Response test to see if you're exploitable! Learn more and start your free trial at https://lnkd.in/gJgcswqU. #pentesting #infosec
22
-
Black Duck
🚨 #BigNews! Black Duck releases the 10th edition of the annual “Open Source Security and Risk Analysis”(OSSRA) report. Findings show that 86% of commercial codebases evaluated contained open source software vulnerabilities and 81% contained high- or critical-risk vulnerabilities. Learn more here: https://bit.ly/4bfmx56
29
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
View Jason’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app