Author: Joseph Carson

Joseph Carson is a cybersecurity professional with more than 20 years’ experience in enterprise security & infrastructure. Currently, Carson is the Chief Security Scientist at Thycotic. He is an active member of the cybersecurity community and a Certified Information Systems Security Professional (CISSP).

Cybersecurity is quickly becoming part of everyone’s daily life and can no longer be separated between personal and work life. In the past, cyber-attacks were typically only a concern for the workplace; however, today that is no longer the case with cyber-attacks becoming more common – effecting everyone connected to the internet. Cyber-attacks are going to be the biggest threat to everyone and businesses on earth and will be the trigger for future wars and political instability. Cyber-attacks do not care about the age, gender, race, culture, beliefs or nationality of its victims. They attack based on opportunity and/or financial…

Read More

Cyber security is an incredibly hot topic right now. With more than 3.5 billion Internet users worldwide, there are millions of opportunities for hackers to exploit, and in recent years, Black Friday and Cyber Monday have become prime targets for cyber criminals to create scams that lure unsuspecting victims. If we look at all of the cyber breach reports in the past year – we can clearly see that it has been a busy time for cyber criminals. Public reports describe over 500 data breaches and more than 1.2 billion records stolen this year alone. So why do we continue…

Read More

It has been more than three years now since Edward Snowden revealed and leaked sensitive and classified information to several journalists about a secret, and massive, government surveillance program. Currently in asylum within Russia, Snowden has been charged with theft of government property, unauthorized communication of national defense information and willful communication of classified intelligence to an unauthorized person. This story is a classic reminder of how impactful and powerful a trusted insider can become by elevating privileges and leaking sensitive data undetected. This act has been a major controversy for years and it has been debated whether or not…

Read More