Javvad Malik

Javvad Malik

The man, the myth, the blogger; Javvad Malik is a London-based IT Security professional. Better known as an active blogger, event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security. Prior to joining AlienVault, Javvad was a senior analyst with 451 Research providing technology vendors, investors and end users with strategic advisory services, including competitive research and go-to-market positioning.

November 16, 2016 | Javvad Malik

IoT: Usability Dream or Privacy Nightmare?

Probably the best £100 I’ve ever spent was on a Nest Protect. It’s awesome. In a nutshell, it’s a Wi-Fi enabled smoke and carbon dioxide detector. My “dumb” one worked just as well but this one has a number of key advantages.Firstly, it lets me know when my batteries are running…

November 4, 2016 | Javvad Malik

Alien Eye in the Sky 4th November

Below are all the links to the stories in the video, and then there’s the long list of other interesting stories that didn’t make it into the video.Stories in the videohttp://www.theregister.co.uk/2016/10/24/chinese_firm_recalls_webcams_over_mirai_botnet_infection_ddos_woes/http://www.bbc.co.uk/news/technology-37761868https://www…

Get the latest security news in your inbox.

Subscribe via Email

November 1, 2016 | Javvad Malik

Understanding the Mirai Threat on IoT - Open Letter to Manufacturers

I wrote a blog that got posted last weekend on Mirai, then thought perhaps I should compose an open letter to IoT manufacturers. I made this short video to explain.Stay safe, consumers of IoT! …

October 22, 2016 | Javvad Malik

The Mirai Botnet, Tip of the IoT Iceberg

The Mirai botnet is malware designed to take control of the BusyBox systems that are commonly used in IoT devices. BusyBox software is a lightweight executable capable of running several Unix tools in a variety of POSIX environments that have limited resources, making it an ideal candidate for IoT devices. It appears the DDoS attacks of October 21 have been identified…

October 21, 2016 | Javvad Malik

Alien Eye In the Sky 21st October 2016

We’ve got the week’s news covered for you.In This Week's EpisodeNation State Threat AttributionMercedes autonomous carsStephen Hawking on AIBanks failing to report hacksIndian Bank debit card breachOther Stories of InterestFemale speakers for your tech eventHow hackers handle stolen login dataDFIR and Threat HuntingThe real…

October 19, 2016 | Javvad Malik

Seven Tips For Optimizing Security

verb (used with object), optimized, optimizing.1. to make as effective, perfect, or useful as possible. 2. to make the best of.Breaches continue, attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.While ‘fixing’ security in totality is a topic…

October 18, 2016 | Javvad Malik

Vulnerability Scanning - Tip Tuesday for NCSAM

The art of detecting vulnerabilities within the enterprise environment has been around for some time. Vulnerability scanning and management technologies and methodologies have evolved (sometimes rather quietly) to meet customer demands, which are fuelled by compliance and regulatory requirements.In simple terms, vulnerability scanning is to look for vulnerabilities within an environment.As an example, let’s use a…

October 17, 2016 | Javvad Malik

Overcoming Skill Gaps, Shortages, and Recruitment Challenges in InfoSec

In recent years, many virtual column inches have been dedicated to discussing the cyber security skills gap. According to the Global Information Security Workforce Study (GISWS) by Frost & Sullivan for the (ISC)2 foundation, a shortfall of 1.5 million security professionals is forecast by 2020. These are large numbers, but it’s important to remember that skills shortages and surpluses aren…

October 14, 2016 | Javvad Malik

Alien Eye in the Sky 14th October 2016

We’ve got the weeks’ news covered for you.Links to stories in the videoThe beginning of the end(point): where we are now and where we’ll be in five years The strange way people perceive privacy online Tesla responds to Chinese hack with a major security upgrade Good cybersecurity can be good marketing Cyber:…

October 11, 2016 | Javvad Malik

Behavioral Monitoring - Tip Tuesday for NCSAM

During Week Two of National Cyber Awareness Month (NCSAM), our focus is on behavioral monitoring.Often times, behavioral monitoring is uttered in the same sentence as big data analytics, or algorithms - making it sound as if behavioral monitoring is a form of witchcraft.In many instances, behavioral monitoring can be undertaken with few resources in a simple way.Behavioral…

October 7, 2016 | Javvad Malik

Alien Eye in the Sky, Friday 7 October

It’s been a busy week in the land of information security. But don’t worry, we’ve got it all covered. Links to stories in video:Ransomware operator shut downStealing an AINobody is bidding on shadowbrokers filesUS government IP address contract endsDon’t be YahooVerizon wants $1bn discountYou…

October 4, 2016 | Javvad Malik

Knowing Your Assets - Tip Tuesday for NCSAM

During Week One of National Cyber Awareness Month (NCSAM), our focus is on knowing your assets.Often-times when speaking with businesses, you ask if they know what their assets are and you get one of two common reactions: those whose eyebrows shoot up and admit they have no clue; or those who understand what their assets are and have a …

Watch a Demo ›
Get Price Free Trial