Stephen Cobb

Stephen Cobb

Senior Security Researcher


Education: Master of Science in Security and Risk Management, University of Leicester, UK

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002); TEDx talk (2015)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.


224 articles by Stephen Cobb

Less Technical

National Small Business Week: a cybersecurity survival guide

National Small Business Week: a cybersecurity survival guide

Less Technical

National Small Business Week: a cybersecurity survival guide

It's National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital to its success, here's a cybersecurity survival guide.

Stephen Cobb04 May 20153 min. read


Less Technical

OFAC! An acronym that cybersecurity professionals need to know

OFAC! An acronym that cybersecurity professionals need to know

Less Technical

OFAC! An acronym that cybersecurity professionals need to know

OFAC will soon be enforcing economic and trade sanctions against individuals and groups outside the United States that use cyber attacks to threaten U.S. foreign policy, national security or economic stability.

Stephen Cobb28 Apr 20157 min. read


Less Technical

RSA Conference 2015: too much technology and not enough people?

RSA Conference 2015: too much technology and not enough people?

Less Technical

RSA Conference 2015: too much technology and not enough people?

Major themes of the 2015 RSA Conference: the degree to which the deployment of digital devices is outpacing our ability to deploy humans with the necessary skills and knowledge needed to secure data and systems.

Stephen Cobb24 Apr 20155 min. read


Less Technical

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo and Superfish? Don't panic, you may not be affected

Less Technical

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

Stephen Cobb20 Feb 20154 min. read


Less Technical

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Less Technical

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Is America's new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center at DHS?

Stephen Cobb11 Feb 20154 min. read


Less Technical

U.S. tax identity theft: dodging the $5 billion crime spree

U.S. tax identity theft: dodging the $5 billion crime spree

Less Technical

U.S. tax identity theft: dodging the $5 billion crime spree

Tax Identity Theft Awareness Week? Yes, tax ID fraud is a real threat to your finances in America today. Putting your tax refund in jeopardy is just one of the impacts.

Stephen Cobb28 Jan 201511 min. read


Privacy

Data Privacy Day 2015: Respecting privacy, safeguarding data, enabling trust

Data Privacy Day 2015: Respecting privacy, safeguarding data, enabling trust

Privacy

Data Privacy Day 2015: Respecting privacy, safeguarding data, enabling trust

January 28 is Data Privacy Day, an international acknowledgment of the importance of privacy in an increasingly data-driven world. The key themes of Data Privacy Day this year are: Respecting privacy, Safeguarding data, Enabling trust.

Stephen Cobb27 Jan 20152 min. read


Cybercrime

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

Blackhat:  Lessons from the Michael Mann, Chris Hemsworth movie?

Cybercrime

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?

Stephen Cobb23 Jan 20155 min. read


Less Technical

Mobile health IT security challenge: way bigger than HIPAA?

Mobile health IT security challenge: way bigger than HIPAA?

Less Technical

Mobile health IT security challenge: way bigger than HIPAA?

Wearable technology and other health-related devices were big at the 2015 Consumer Electronics Show (CES) earlier this month. This recorded webinar explains why these and related technologies present big challenges for data privacy and security.

Stephen Cobb22 Jan 20151 min. read