Steve Tso
FOUNDER
CYBER BUSINESS REVIEW • VICTORIA, BC
BIO
Steve is an accomplished B2B marketer and a major advocate for value-based marketing. He founded Cyber Business Review and uniquely positioned it as an unbiased knowledge sharing platform dedicated to cybersecurity.
Prior to starting CBR, Steve ran Americas Marketing Campaigns at Symantec, where he won ANA's B2B Marketing Award for Best B2B Custom Publication for his crowdsourced book “Canadian Cybersecurity”. Prior to joining Symantec, Steve headed up Marketing at Palo Alto Networks Canada.
ARTICLES
29-May | Written by Steve Tso
Phishing is a form of deception, and deceptions are comprised of two components: a distraction, and a decoy. The greater the distraction, the more effective the decoy. Both work together to entice its victims to commit. CV-19 represents an impactful distraction that’s prolonged. And hackers are taking advantage by pairing CV-19 with a myriad of relatable decoys. This article discusses the ramification of this through the lens of a typical Canadian family.
11-May | Written by Steve Tso
Similar to not wearing a seat belt, not taking cybersecurity preventative measures is irresponsible. In this article, I draw a comparison between the two and explain how getting to the point of being numb with something that’s clearly in the wrong doesn’t make it right. I then discuss the origins of Cyber Business Review, how it works, and how you can get involved.
COMMENTARIES
14-May | via Forbes
Donald Trump declared National Emergency on Friday, March 13. Since then, organizations have been deploying technology at unprecedented rates to achieve everything from remote work to COVID-19 patient tracking…
11-May | via Forbes
AI (Artificial Intelligence) and ML (Machine Learning) have evolved past the “buzzword” phase. They are now mainstream technologies regularly deployed at all areas of business. From a cybersecurity perspective, hackers are using AI/ML to attack, while organizations are using them to defend…
11-May | via Forbes
There’s been much discussion around what the office of the future may look like post COVID-19. However, there hasn’t been much information on how this extends to healthcare facilities and how the ER of the future may operate…
8-May | via Bleeping Computer
We’ve all heard it before, and some may even be numb to it. “Company X got hacked and Y amount of personal data was stolen”. Well, what does that really look like? This article from bleepingcomputer.com paints a dark reality on what hackers sell post breach…
7-May | via New York Law Journal
COVID-19 is forcing employees to work from home. This extension of the company IT perimeter into employee households is opening up a new wave of attack vectors for cybercriminals. Companies have accepted the fact that their cyber defense will never be 100% effective, and knowing that the average cyber incident costs $4 million, they are turning to cyber insurance as a mitigation tool…
8-May | via Atlantic Council
As reliance on technology expands, the field of cybersecurity will increasingly require more talent. Only problem is that the workers aren’t there. (ISC)2’s Cyber Workforce Study 2019 states that the current cyber workforce will need to grow by 145% in order to meet existing demand.