Cameron Camp

Cameron Camp

Security Researcher


Education: CISSP, RHCSA

Highlights of your career? Reverse engineering human brain patterns.

What malware do you hate the most? Nation state sponsored low and slow.

Favorite activities? Building and flying airplanes.

What is your golden rule for cyberspace? Stupid hurts.

When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.

Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.


273 articles by Cameron Camp

Business Security

Preventative defense tactics in the real world

Preventative defense tactics in the real world

Business Security

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack

Cameron Camp17 Jun 20243 min. read


Digital Security

What happens when AI goes rogue (and how to stop it)

What happens when AI goes rogue (and how to stop it)

Digital Security

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response

Cameron Camp22 May 20243 min. read


Digital Security

RSA Conference 2024: AI hype overload

RSA Conference 2024: AI hype overload

Digital Security

RSA Conference 2024: AI hype overload

Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.

Cameron Camp09 May 20243 min. read


Scams

Break the fake: The race is on to stop AI voice cloning scams

Break the fake: The race is on to stop AI voice cloning scams

Scams

Break the fake: The race is on to stop AI voice cloning scams

As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection

Cameron Camp23 Jan 20244 min. read


Digital Security

Very precisely lost – GPS jamming

Very precisely lost – GPS jamming

Digital Security

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill

Cameron Camp29 Nov 20232 min. read


Digital Security

Fuel for thought: Can a driverless car get arrested?

Fuel for thought: Can a driverless car get arrested?

Digital Security

Fuel for thought: Can a driverless car get arrested?

What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks?

Aryeh Goretsky and Cameron Camp21 Nov 20237 min. read


Cybercrime

Virus Bulletin – building digital armies

Virus Bulletin – building digital armies

Cybercrime

Virus Bulletin – building digital armies

Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack

Cameron Camp11 Oct 20233 min. read


Digital Security

Virus Bulletin PUA – a love letter

Virus Bulletin PUA – a love letter

Digital Security

Virus Bulletin PUA – a love letter

Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors

Cameron Camp10 Oct 20233 min. read


Secure Coding

Can open-source software be secure?

Can open-source software be secure?

Secure Coding

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 20235 min. read