Twitter | Search | |
Michael Ash
An IBMer with a passion for cognitive solutions, and cyber-security as it related to improving patient safety and outcomes. Tweets are my views only...
130
Tweets
62
Following
61
Followers
Tweets
Michael Ash Apr 13
How Effective Is Security Awareness Training for Threat Prevention?
Reply Retweet Like
Michael Ash Apr 13
Social Engineering: A Trick as Old as Time
Reply Retweet Like
Michael Ash Apr 12
The new hot trend in cyberthieving is holding your cloud data ransom.
Reply Retweet Like
Michael Ash Apr 10
The Future of Cognitive Security Is Now
Reply Retweet Like
Michael Ash Apr 6
Why Military Veterans Are a Great Fit for Cybersecurity Careers
Reply Retweet Like
Michael Ash Mar 30
The Account Checker Knocking at Your Doo
Reply Retweet Like
Michael Ash Mar 27
Drop Everything and Enable Two-Factor Authentication Immediately
Reply Retweet Like
Michael Ash Mar 16
Quantum Computing and Cryptography: What You Need to Know
Reply Retweet Like
Michael Ash Mar 15
New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents
Reply Retweet Like
Michael Ash Mar 13
Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration
Reply Retweet Like
Michael Ash Feb 5
IBMSecurity Experts Recommend Early Filing to Thwart Tax Security Threats
Reply Retweet Like
Michael Ash Dec 27
Beware of the Latest Punycode Attacks
Reply Retweet Like
Michael Ash Dec 22
Closing ATM Network Security Gaps to Stop Fraudsters in Their Tracks
Reply Retweet Like
Michael Ash Dec 21
Year in Review: How Did the Cyberthreat Landscape Change in 2017?
Reply Retweet Like
Michael Ash Dec 15
From Waterfall to SecDevOps: The Evolution of Security Philosophy
Reply Retweet Like
Michael Ash Dec 12
Understanding the COSO 2017 Enterprise Risk Management Framework
Reply Retweet Like
Michael Ash Oct 19
Amazon unlikely to launch in Korea eCommerce
Reply Retweet Like
Michael Ash Oct 18
IBMSecurity's warns that firms are unprepared for public disclosure of attacks
Reply Retweet Like
Michael Ash Oct 18
The learned about ’s Cyber Range and how companies can practice cyber preparedness
Reply Retweet Like
Michael Ash Sep 7
Key-logging malware, dubbed EHDevel, found intelligence gathering
Reply Retweet Like