Activity
-
I'm looking for estimates of what % of cyber incidents are caused by software vulnerabilities. So far, I have: - Less than 20% of data breaches…
I'm looking for estimates of what % of cyber incidents are caused by software vulnerabilities. So far, I have: - Less than 20% of data breaches…
Liked by Joe Levy
-
Seems accurate (first published by "Jabroni capital") ?
Seems accurate (first published by "Jabroni capital") ?
Liked by Joe Levy
-
By me at Forbes: Interesting threat analysis from Sophos X-Ops Team revealing a pivot to harvesting endpoint Chrome credentials in recent Qilin…
By me at Forbes: Interesting threat analysis from Sophos X-Ops Team revealing a pivot to harvesting endpoint Chrome credentials in recent Qilin…
Liked by Joe Levy
Experience
Education
Publications
-
SonicWALL Secure Wireless Network Integrated Solutions Guide
Syngress
SonicWALL® Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the…
SonicWALL® Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats.
Patents
More activity by Joe
-
Check out our latest report: thorough analysis and plenty of detection opportunities. It's a must-read, especially for folks new to InfoSec.
Check out our latest report: thorough analysis and plenty of detection opportunities. It's a must-read, especially for folks new to InfoSec.
Liked by Joe Levy
-
Anyone who knows me knows that I have suffered from extreme low back pain for decades. Maybe it has something to do with sitting in a computer chair…
Anyone who knows me knows that I have suffered from extreme low back pain for decades. Maybe it has something to do with sitting in a computer chair…
Liked by Joe Levy
-
Mark Ermolov (@_markel___) posted on Twitter that they managed to extract the Intel SGX Root Provisioning Key. Insane and great work. You can't have…
Mark Ermolov (@_markel___) posted on Twitter that they managed to extract the Intel SGX Root Provisioning Key. Insane and great work. You can't have…
Liked by Joe Levy
-
I am very honoured to be nominated as a finalist in the 'Cybersecurity Leadership' category at the 2024 CompTIA Community ANZ Spotlight…
I am very honoured to be nominated as a finalist in the 'Cybersecurity Leadership' category at the 2024 CompTIA Community ANZ Spotlight…
Liked by Joe Levy
-
This is such an incredible team and we are beyond excited to welcome them to Cisco!
This is such an incredible team and we are beyond excited to welcome them to Cisco!
Liked by Joe Levy
-
Thanks to Craig Newmark for his generous support of the Cyber Threat Alliance! #cybersurity
Thanks to Craig Newmark for his generous support of the Cyber Threat Alliance! #cybersurity
Liked by Joe Levy
-
As CTO, I recently had the chance to meet with F5's legal team. During this intimate session, I shared my career journey and my vision for the Office…
As CTO, I recently had the chance to meet with F5's legal team. During this intimate session, I shared my career journey and my vision for the Office…
Liked by Joe Levy
-
I know, I know, I’m super late posting about my experience at BlackHat . In my defense, I took a much needed 2 week vacation right after and ended…
I know, I know, I’m super late posting about my experience at BlackHat . In my defense, I took a much needed 2 week vacation right after and ended…
Liked by Joe Levy
-
Last Thursday, we had another series of the Sophos Rock Security event - 4th edition - held annually by our platinum channel Via Connect. More than…
Last Thursday, we had another series of the Sophos Rock Security event - 4th edition - held annually by our platinum channel Via Connect. More than…
Liked by Joe Levy
-
Your security team probably does not need all of the fancy warehouses, XDRs, detection-as-code platforms, or really any other high speed-low drag Big…
Your security team probably does not need all of the fancy warehouses, XDRs, detection-as-code platforms, or really any other high speed-low drag Big…
Liked by Joe Levy
-
Come and join me at the CompTIA Community - ANZ Regional Group Meeting & Spotlight Awards Dinner as we celebrate the achievements of fellow Community…
Come and join me at the CompTIA Community - ANZ Regional Group Meeting & Spotlight Awards Dinner as we celebrate the achievements of fellow Community…
Liked by Joe Levy
-
A long, to be read article from Wolfram about ML/NL insides. https://lnkd.in/eiZ7Px2W
A long, to be read article from Wolfram about ML/NL insides. https://lnkd.in/eiZ7Px2W
Liked by Joe Levy
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Joe Levy in United States
233 others named Joe Levy in United States are on LinkedIn
See others named Joe Levy