About
Articles by Tony
-
Marketing: The Essential Fuel and Engine for Business Success
Marketing: The Essential Fuel and Engine for Business Success
By Tony Bradley
-
Unveiling the (Marketing) Elephant in the Room
Unveiling the (Marketing) Elephant in the Room
By Tony Bradley
Activity
-
The Rise Of Data-Centric Incident Response According to Tony Bradley, companies today need a data-centric incident response. "In many organizations,…
The Rise Of Data-Centric Incident Response According to Tony Bradley, companies today need a data-centric incident response. "In many organizations,…
Liked by Tony Bradley
-
Insightful article from Tony Bradley (via Forbes) on the need for a data-centric approach to Incident Response & how #Druva bridges IT and Security…
Insightful article from Tony Bradley (via Forbes) on the need for a data-centric approach to Incident Response & how #Druva bridges IT and Security…
Liked by Tony Bradley
-
Excited for the direction Mimecast headed with our Human Risk Management platform and the announcement today of the acquisition of Code42! Looking…
Excited for the direction Mimecast headed with our Human Risk Management platform and the announcement today of the acquisition of Code42! Looking…
Liked by Tony Bradley
Experience & Education
Licenses & Certifications
Publications
-
2023-2024 SLED Cybersecurity Priorities Report
NuHarbor Security
This report is created to advise and empower SLED cybersecurity leaders. It provides data-driven insights from senior leaders, analysts, and experts, identifying trends and successes that are defining a new generation of cybersecurity visionaries.
-
Prevent Checkmate: Executing an Effective CTEM Program
Epiphany Systems
Epiphany’s CTEM eBook is a free resource that explains how to use Continuous Threat Exposure Management to improve your cybersecurity strategy. It describes the elements that comprise a CTEM program and describes how the Epiphany Intelligence Platform automates and enables effective continuous threat exposure management.
-
Ransomware: The True Cost to Business (2022)
Cybereason
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second…
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second time, with 68% saying the second attack came less than a month later and threat actors demanded a higher ransom amount...
Other authorsSee publication -
Organizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason
Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
Show publication
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33%…Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
Show publication
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a ransomware attack, a situation that can factor into employee job satisfaction and potential burnout. One surprising finding in the study included 70% of respondents confessing that they have been intoxicated while responding to a ransomware attack during a weekend or holiday, a risk factor that many organizations may not have accounted for in their incident response planning...Other authorsSee publication -
Ransomware: The True Cost to Business (2021)
Cybereason
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the…
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the end only exacerbates the problem by encouraging more attacks. Getting in front of the threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive ransomware before they can hurt the business.
Other authorsSee publication -
Unified Communications for Dummies
For Dummies (Wiley)
Discover what Unified Communications can do for your business
In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.
This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For…Discover what Unified Communications can do for your business
In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.
This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For Dummies introduces you to the many advantages this technology offers your business and shows you how to develop a strategy for bringing it about.
Unified Communications is a new paradigm for working and communicating efficiently and collaboratively
This book explains the features available with Unified Communications and how they can create new capabilities to drive customer satisfaction
Shows how Unified Communications encompasses office and mobile phones, voicemail, instant messaging, fax, Internet phone calls, texting, and even Web conferencing
Provides a step-by-step approach for creating a Unified Communications strategy
Offers tips for improving the implementation process
Shares real-world examples of how Unified Communications is being used today
Unified Communications For Dummies shows you how to meet business needs with this emerging, cutting-edge solution.Other authorsSee publication -
PCI Compliance (Understand and Implement Effective PCI Data Security Standard Compliance)
Syngress
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or…
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
*PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data
*Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant
*The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needsOther authorsSee publication -
Essential Computer Security (Everyone's Guide to E-mail, Internet, and Wireless Security)
Syngress
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.
-
Hacker's Challenge 3
McGraw-Hill / Osborne
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more…
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.
Other authorsSee publication
Organizations
-
Microsoft MVP
-
-
Recommendations received
68 people have recommended Tony
Join now to viewMore activity by Tony
-
Great read from Tony Bradley on Druva's new Threat Hunting capability and the rise of data-centric incident response (via Forbes): "The traditional…
Great read from Tony Bradley on Druva's new Threat Hunting capability and the rise of data-centric incident response (via Forbes): "The traditional…
Liked by Tony Bradley
-
Very proud of our team, and it was a lot of fun chatting with Tony Bradley!
Very proud of our team, and it was a lot of fun chatting with Tony Bradley!
Liked by Tony Bradley
-
We're very excited to share that Pattern Labs was just covered in Forbes! Pattern Labs' Dan Lahav had a great conversation with Tony Bradley who…
We're very excited to share that Pattern Labs was just covered in Forbes! Pattern Labs' Dan Lahav had a great conversation with Tony Bradley who…
Liked by Tony Bradley
-
Mandatory return-to-office policies have overwhelmingly failed. Want to jettison your best talent? Double down on forcing them back into the office…
Mandatory return-to-office policies have overwhelmingly failed. Want to jettison your best talent? Double down on forcing them back into the office…
Liked by Tony Bradley
-
Generative AI is changing things, but there are still plenty of phishing and BEC attacks circulating that are easy to identify and avoid thanks to…
Generative AI is changing things, but there are still plenty of phishing and BEC attacks circulating that are easy to identify and avoid thanks to…
Liked by Tony Bradley
-
Sending out some empathy to the Crowdstrike marketing team today: https://lnkd.in/gYKJyjKe #crisiscommunications
Sending out some empathy to the Crowdstrike marketing team today: https://lnkd.in/gYKJyjKe #crisiscommunications
Liked by Tony Bradley
Other similar profiles
-
Matt Alderman
Connect -
Brooke Potter
Connect -
Shawn Mullican
Connect -
JR Cook
Connect -
Ben Tomhave
Connect -
Kareem Kamahl T.
OWNER/OPERATOR at Digital Darklords, LLC AND FOUNDER/CEO at Comics and Books Rescue for Kids Foundation
Connect -
Rohit Ghai
Connect -
🟡Allison Ybarra-Lopez
Client Success Manager I Sales Support I Driving Growth & Retention
Connect -
Mia Francis-Poulin
Copywriter-in-Chief @ The Copy Haus -- the online business owner's one-stop, flat-rate subscription for words that sell. | Leader in ethical copywriting | NOLA-born crawfish enthusiast.
Connect -
Amy Matthews
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Tony Bradley in United States
-
Tony Bradley
-
Tony Bradley
-
Tony Bradley
BBA in Entrepreneurship and Enterprise Management | University of North Texas
-
Tony Bradley
Senior Manager at TPG Global
364 others named Tony Bradley in United States are on LinkedIn
See others named Tony Bradley