Javvad Malik

Opinions expressed by ICN authors are their own.

Javvad Malik is an award-winning information security consultant, author, researcher, analyst, advocate, blogger and YouTuber. He currently serves as a security advocate at AlienVault.

An active blogger, event speaker and industry commentator, Javvad is known as one of the industry’s most prolific influencers, with a signature fresh and light-hearted perspective on security.

Prior to joining AlienVault, he was a senior analyst with 451 Research providing technology vendors, investors and end users with strategic advisory services, including competitive research and go-to-market positioning. Prior to that, Javvad served as an independent security consultant, with a career spanning 12+ years working for some of the largest companies across the financial and energy sectors.

Javvad is an author and co-author of several books, including The CISSP Companion Handbook: A Collection of Tales, Experiences and Straight Up Fabrications Fitted Into the 10 CISSP Domains of Information Security and The Cloud Security Rules: Technology is Your Friend. And Enemy. A Book About Ruling the Cloud. He’s also the founder of the Security B-Sides London conference and a co-founder of Host Unknown with Thom Langford and Andrew Agnés.

Javvad has earned several professional certifications over the course of his career, including Certified Information Security Systems Professional (CISSP) and GIAC Web Application Penetration Tester (GWAPT). He’s also won numerous awards in recent years for his blogging, including the "2015 Most Entertaining Blog" and the "2015 Best Security Video Blogger" recognitions at the European Security Blogger Awards.

The opinions expressed in this blog are those of Javvad Malik and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Nothing new to (Wanna)Cry about

Is your company spending on the right security technologies?

Is your company spending on the right security technologies?

Here are three considerations that can help companies make the right decisions when it comes to investing in security technology.

Well-funded doesn't mean well-secured

Well-funded doesn't mean well-secured

Being able to buy security products doesn't mean your business is secure. You need an integrated, security technology strategy.

3 tips to improve threat detection and incident response

3 tips to improve threat detection and incident response

These three security controls are surefire ways to improve threat detection and incident response to hacks and data breaches.

Five ways cybersecurity is nothing like the way Hollywood portrays it

Five ways cybersecurity is nothing like the way Hollywood portrays it

Javvad Malik, AlienVault, takes a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies.

8 security tips for retailers and consumers this holiday season

8 security tips for retailers and consumers this holiday season

Here are eight tips for retailers and consumers to keep top of mind this holiday season to prevent them from becoming a victim of holiday scams.

Load More