Jack Fitzpatrick’s Blog

The Role of the Ethical Hacker

The Role of the Ethical Hacker

When it comes to protecting data and information, integrating appropriate programs, technologies, and failsafes is important. However, an essential role in assuring security and defending against cyber attacks is that of the ethical hacker. 

read more
Solving the False Positive Epidemic with Third Wave Artificial Intelligence

Solving the False Positive Epidemic with Third Wave Artificial Intelligence

The false positive issue that has become prominent in the cybersecurity industry affects every usage of software designed to identify and warn against cyberattacks, security breaches, data leaks, and more. False positives are simply incorrect predictions of issues that lead to an inaccurate positive outcome; in cybersecurity programs, the positive outcome or class typically refers to an alert indicating a threat.

read more
Changing Business Models in the Tech Industry

Changing Business Models in the Tech Industry

The introduction of revolutionary technology like cloud computing is changing the way businesses operate. In the case of cloud computing, this technology is no longer seen solely as a tool but rather as a business model. For technology companies and other Information...

read more
Security Implications in Digital Transformation

Security Implications in Digital Transformation

Originally posted on June 12, 2018 on LinkedIn. Digital transformation is here to stay, and we need to find ways to make our peace with that—and ways to grow our businesses without creating additional vulnerabilities for our enterprises. The answer is not simply to...

read more
What to Look Out for When Hiring a New CISO

What to Look Out for When Hiring a New CISO

Originally posted on December 11, 2018 on LinkedIn. The traditional role of the CISO is changing. It is being challenged by emerging new regulations such as GDPR, which are impacting all industry sectors, and the arrival on the scene of the new role of the Data...

read more
How To Secure the Internet of Things

How To Secure the Internet of Things

Originally posted on November 26, 2018 on LinkedIn. Nobody anticipated the internet would cause the disruption it has, when it was first invented. Not even the inventors and innovators. Personal lives, businesses and governments have all been overhauled by the...

read more