Mark Fuentes has over a decade of experience in the cyber security field highlighted by roles in organizations such as Verizon, The International Monetary Fund, and The United States Department of Homeland Security. Mark is an avid consumer of technology trends and threat intelligence and seeks out new applications of tech and research to combat cyber crime.
Cybersecurity has been around as long as computers have existed, but has only seen mainstream attention in the past decade or so, with the rise of the internet. Why are there over 1 million cybersecurity jobs in the United States remaining unfilled?
In this article, Deputy Director of Cyber Operations Mark Fuentes goes deep into what ransomware can and cannot do — jumping into misconceptions and myths about ransomware attacks and revealing the truth behind those notions.
SQL injections remain one of the simplest hacks in the history of cyberattacks, still going strong after 21 years and among the OWASP Top 10 vulnerabilities. In this article, we talk about SQL injection, its methods of prevention, and why it is still effective today.
Ransomware is as commonplace in our lives today as email. All signs indicate that ransomware is not going away any time soon. So where did this nefarious family of malware come from?
Learn how MITM attacks work, the various types and forms it presents itself in, and appropriate mitigation measures that organizations can take.
Join Horangi Deputy Director of Cyber Operations Mark Fuentes in our pilot episode of Ask A CISO! In here, Mark looks at the typical data privacy challenges and then shows how a security-first approach helps organizations achieve their compliance goals efficiently.
Cyber Security Strategy: A Crash Course Your organization has identified that it is important to have a cyber security strategy. You want to address cyber security within your organization. But where do you start? The task of putting together a cyber security strategy can be daunting. The larger your organization gets, this task may even approach monolithic proportions in your
Cybersecurity is making its way to the forefront of every enterprise’s agenda. Even for organizations that are not at the point where it’s an overwhelming priority, it’s a safe bet that cybersecurity is an area of deep concern in their boardrooms. As we delve deeper into the 21st century, enterprises that have been operating