John Shier

When the smallest vendor becomes the weakest cyber-threat link

John Shier joins Jim Blasingame to discuss examples of how an unlikely vendor became the weak link connection that contributed to a major cyber-breach.

More interviews with John Shier

John Shier
Do you know how to deal with a ransomware attack?
John Shier
A true story of what happens when you get hit with a ransomware attacks
John Shier
How bad is cyber-crime and ransomware getting?
John Shier
Blending Canada’s thanksgiving with a cyber-security report
John Shier
How to do your part in protecting the cloud from cyber-attacks