Tom Kellermann, The Wilson Center

Tom Kellermann

The Wilson Center

United States

Contact Tom

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • The Wilson Center
  • CSOonline
  • Trend Micro

Past articles by Tom:

Follow the Money: Civilizing the Darkweb Economy

A modern epidemic of cybercrime is sustained via the transfer of capital associated with virtual currencies. → Read More

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary. Whereas an effective hunt can mitigate lateral movement and the exfiltration of the crown jewel the true utility of an effective hunt team is to inhibit destructive… → Read More

Political Figures = Preferred cyber-espionage targets

For years physical security has been imperative for political officials, with body guards and teams of agents securing the leaders of the world. In 2015, the need for protection has begun shifting from the “physical” to the “virtual” as cybercriminals and cyber-spies have started to target leaders. As noted in the third quarter security roundup, Hazards Ahead: Current Vulnerabilities Prelude... → Read More

Celebrating Our Technology Superstars This Techies Day

Technology sits at the center of all of our lives. It makes us more productive at work and entertained at home. It helps us keep in touch with family and friends, no matter where they are in the world. It even plays a major role in our health and wellbeing. But often those who work... → Read More

October 1, 2015: Happy EMV Day! What it means for you.

October 1, 2015 is EMV Day in the United States. Specifically, it’s the date that the credit card industry has picked for the switchover in the United States from credit cards that use 1960s-era magnetic strips to ones that support EMV, the industry’s term for credit cards with an embedded chip. “EMV stands for “Europay,... → Read More

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for... → Read More

DevSecOps in the AWS Cloud

Security teams need to change their approach in order to be successful in the AWS Cloud. Sure the controls you’re using are similar but their application is very different in a cloud environment. The same goes for hows teams interact as they embrace cloud technologies and techniques. The concept of DevOps is quickly becoming DevSecOps... → Read More

Malicious Code Slips into Apple’s Walled Garden: Millions of iOS Devices Affected

As the mobile malware epidemic has raged on the Android platform, people on iOS have been relatively safe. There are many reasons why this is the case, but one of the chief reasons is that Apple has claimed that they keep their “walled garden” safe meaning that they keep malicious code and malware from entering... → Read More

Trend Micro’s Data Breach Report: “Follow the Data: Dissecting Data Breaches and Debunking Myths”

Data breaches are in the news all the time these days. Whether it’s the loss of credit and debit card information from a retailer like Target or personal and health care information from a health insurance company like Premera Blue Cross, there’s a steady drumbeat of stories about data being lost to attackers. But the... → Read More

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for... → Read More

Sanctions For Hacking: Good or Bad Idea?

Sanctions for hacking is something that should be seriously considered. → Read More

Operation Iron Tiger: Attackers Shift from East Asia to the United States

News that Chinese hackers are targeting US-based defense contractors isn’t new information. Over the past year or two we’ve repeatedly seen news and allegations of this kind of offensive activity for cyberwar and corporate espionage purposes. A year ago, we heard of allegations of this kind of activity in hearings in the United States Senate.... → Read More

What’s the Best Free Clean up Software for Mac OS X?

In my opinion, only 20 percent of an app’s features need to be paid for by the user. But for most users, what they really need is the remaining 80 percent that should have been free. However, in most situations, to get that useful 80 percent, users have to dig down in their pockets for... → Read More