Tony Anscombe

Tony Anscombe

Chief Security Evangelist


Education: Cobol and Fortran programming, it was a long time ago.

Highlights of your career: Appearing on the BBC News, the live appearance was regarding an article about a hacker that was 12 years old and stealing game data. The cool part was that it remained the number one article on the BBC News app for four days, it seemed that just about everyone I know saw it! The only thing that could top this is to be on Good Morning America or on the BBC Breakfast sofa.

What malware do you hate the most: Potentially unwanted applications, deceiving consumers and destroying their computer is wrong.

Favorite activities: Motorbikes, cycling, concerts and family (not in that order).

What is your golden rule for cyberspace: Don’t get sucked in and addicted to the world of social media, and never post pictures of food.

When did you get your first computer, favorite computer game/activity: My first computer was a Sinclair ZX81 Spectrum, back around 1983/4. It was my first introduction to programming and inspired me to go to college and learn how to code. As for a favorite game, my son and I play two games frequently, Driver (Xbox) and Fifa (PS4), it is a very competitive pastime and not good for my blood pressure.


103 articles by Tony Anscombe

How regulatory standards and cyber insurance inform each other

How regulatory standards and cyber insurance inform each other

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with

Tony Anscombe21 Aug 20243 min. read


The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?

Tony Anscombe12 Aug 20243 min. read


Black Hat USA 2024: All eyes on election security

Black Hat USA 2024: All eyes on election security

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated

Tony Anscombe09 Aug 20243 min. read


Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards

Tony Anscombe08 Aug 20243 min. read


Why tech-savvy leadership is key to cyber insurance readiness

Why tech-savvy leadership is key to cyber insurance readiness

Why tech-savvy leadership is key to cyber insurance readiness

Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage

Tony Anscombe07 Aug 20244 min. read


The cyberthreat that drives businesses towards cyber risk insurance

The cyberthreat that drives businesses towards cyber risk insurance

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide

Tony Anscombe31 Jul 20244 min. read


Building cyber-resilience: Lessons learned from the CrowdStrike incident

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances

Tony Anscombe23 Jul 20243 min. read


The complexities of cybersecurity update processes

The complexities of cybersecurity update processes

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike

Tony Anscombe19 Jul 20242 min. read


Cyber insurance as part of the cyber threat mitigation strategy

Cyber insurance as part of the cyber threat mitigation strategy

Cyber insurance as part of the cyber threat mitigation strategy

Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies

Tony Anscombe26 Jun 20245 min. read