“I had the pleasure of working with Eric to help him define and mobilise his insider threat programme. Not only is Eric a master of his craft, he is also a lifelong learner always looking to improve both his own work and that of his team. Throughout our time working together, Eric showcased a deep knowledge of risk management principles, combined with an understanding of an attacker mindset and an an appreciation of how IT systems work. Eric is also a great leader; constructively challenging and encouraging all in his team to give their best. I throughly enjoyed working with Eric and hope that the opportunity arrises to work with him again in the future.”
About
—————— Note ——————
⚠️ I am happy to connect and share relevant insights, but please…
Activity
-
The cybersecurity industry has evolved beyond the need to “see everything.” Today, it’s about knowing what matters most and acting on it. By making…
The cybersecurity industry has evolved beyond the need to “see everything.” Today, it’s about knowing what matters most and acting on it. By making…
Shared by Eric Stylemans
-
As with any new technology, organizations must consider all of the implications of deploying AI technologies in their businesses and operations. This…
As with any new technology, organizations must consider all of the implications of deploying AI technologies in their businesses and operations. This…
Shared by Eric Stylemans
-
According to the survey, common violations by employees include using personal devices as Wi-Fi hotspots and forwarding corporate emails to personal…
According to the survey, common violations by employees include using personal devices as Wi-Fi hotspots and forwarding corporate emails to personal…
Shared by Eric Stylemans
Recommendations received
19 people have recommended Eric
Join now to viewMore activity by Eric
-
The intersection of Gen AI and cybersecurity presents challenges that coexist with unprecedented opportunities. Despite its inherent complexities…
The intersection of Gen AI and cybersecurity presents challenges that coexist with unprecedented opportunities. Despite its inherent complexities…
Shared by Eric Stylemans
-
Cloud cybersecurity integrates strategies, methods, and solutions. This article outlines 10 cloud data security best practices that help protect your…
Cloud cybersecurity integrates strategies, methods, and solutions. This article outlines 10 cloud data security best practices that help protect your…
Shared by Eric Stylemans
-
Security is a crucial aspect of any organization’s success, and cyberthreats are constantly evolving to become more sophisticated and more effective.…
Security is a crucial aspect of any organization’s success, and cyberthreats are constantly evolving to become more sophisticated and more effective.…
Shared by Eric Stylemans
-
A vulnerability, labeled CVE-2024-44131, has been assigned a base severity score of 5.5 out of 10. This security flaw in Apple iOS and macOS enables…
A vulnerability, labeled CVE-2024-44131, has been assigned a base severity score of 5.5 out of 10. This security flaw in Apple iOS and macOS enables…
Shared by Eric Stylemans
-
These 2025 predictions explore critical challenges such as the mass deployment of unsecured AI tools, the urgent need for post-quantum cryptography…
These 2025 predictions explore critical challenges such as the mass deployment of unsecured AI tools, the urgent need for post-quantum cryptography…
Shared by Eric Stylemans
-
So many companies rely on this as the sole source of decision-making for vulnerability management 😞
So many companies rely on this as the sole source of decision-making for vulnerability management 😞
Liked by Eric Stylemans
-
Phishing is one of the most prevalent tactics, techniques, and procedures (TTPs) in today’s cyber threat landscape. It often serves as a gateway to…
Phishing is one of the most prevalent tactics, techniques, and procedures (TTPs) in today’s cyber threat landscape. It often serves as a gateway to…
Shared by Eric Stylemans
-
Phishing attacks are constantly evolving and creating different campaigns that can help them attack as many victims as possible. Users should take a…
Phishing attacks are constantly evolving and creating different campaigns that can help them attack as many victims as possible. Users should take a…
Shared by Eric Stylemans
-
At the heart of AWS’s threat intelligence capabilities is MadPot, a network of distributed honeypots spread across the Amazon EC2 compute…
At the heart of AWS’s threat intelligence capabilities is MadPot, a network of distributed honeypots spread across the Amazon EC2 compute…
Shared by Eric Stylemans
-
Dubbed EagleMsgSpy and created by a Chinese software development company, the tool has been in use since at least 2017, and has only been deployed…
Dubbed EagleMsgSpy and created by a Chinese software development company, the tool has been in use since at least 2017, and has only been deployed…
Shared by Eric Stylemans
-
Ouf…. The Willow chip is not capable of breaking modern cryptography,” Google Quantum AI director and COO Charina Chou. #Google #Quantum…
Ouf…. The Willow chip is not capable of breaking modern cryptography,” Google Quantum AI director and COO Charina Chou. #Google #Quantum…
Shared by Eric Stylemans
-
The framework developed by Dr Karen Renaud, Reader in the Department of Computer & Information Science, identifies seven categories of insider…
The framework developed by Dr Karen Renaud, Reader in the Department of Computer & Information Science, identifies seven categories of insider…
Shared by Eric Stylemans
-
Zero trust is a security framework that allows businesses to operate securely in a borderless environment. It prioritises continuous monitoring and…
Zero trust is a security framework that allows businesses to operate securely in a borderless environment. It prioritises continuous monitoring and…
Shared by Eric Stylemans
-
Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater…
Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater…
Shared by Eric Stylemans
-
On December 10, 2024, Microsoft disclosed a critical vulnerability in its Windows Remote Desktop Services, tracked as CVE-2024-49115. This security…
On December 10, 2024, Microsoft disclosed a critical vulnerability in its Windows Remote Desktop Services, tracked as CVE-2024-49115. This security…
Shared by Eric Stylemans
-
The Cybersecurity and Infrastructure Security Agency (CISA) has released seven new advisories highlighting critical vulnerabilities in widely used…
The Cybersecurity and Infrastructure Security Agency (CISA) has released seven new advisories highlighting critical vulnerabilities in widely used…
Shared by Eric Stylemans
-
A new zero-day vulnerability has been discovered that allows attackers to capture NTLM credentials by simply tricking the target into viewing a…
A new zero-day vulnerability has been discovered that allows attackers to capture NTLM credentials by simply tricking the target into viewing a…
Shared by Eric Stylemans
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Eric Stylemans
1 other named Eric Stylemans is on LinkedIn
See others named Eric Stylemans