Richard Stiennon

Richard Stiennon

Birmingham, Michigan, United States
45K followers 500+ connections

About

I am busy creating the first and only platform for researching the cybersecurity…

Articles by Richard

  • If You Are an Industry Analyst, Please Stop Doing This.

    Every industry analyst wants to create a new three letter acronym (TLA). It’s just something you do.

    25 Comments
  • No-code to the Rescue.

    I am an engineer at heart. That means I like to build and refine things.

    8 Comments
  • Sustainability and Data Security

    As we reach for goals, both personal and professional, it's important to remember the key values that define us along…

    5 Comments
  • A List of Cyber Attacks Against Ukraine

    Security Yearbook 2022 will publish the list of Significant Cyber Incidents tracked by CSIS.org.

    2 Comments
  • Which Cybersecurity Sector Grew the Fastest in 2021?

    In 2021, Security Operations was the fastest growing sectors out of the 16 I track. Security Operations includes all…

    12 Comments
  • Cybersecurity Stocks Up 22.2% in 2021

    Every year I check in on the performance of publicly traded cybersecurity stocks. I print a recap of the data in…

  • Cybersecurity Investments Hit All Time High in 2021

    Now comes my favorite part of laboring for two months to collect all the data on 2,800+ cybersecurity companies and how…

    5 Comments
  • What to Expect in Security Yearbook 2022

    It’s January. That means pulling together all the elements that go into my life’s work: Security Yearbook.

    6 Comments
  • Use Cases for My Dashboard App

    As we build our amazing app for viewing and analyzing industry data on the cybersecurity vendors I am thinking of all…

    1 Comment
  • Creating the Analyst Dashboard

    When I launched IT-Harvest in 2006 I had a vision for a data-driven analyst firm. The name was inspired by the annual…

    41 Comments

Activity

Experience

  • IT-Harvest Graphic

    IT-Harvest

    Birmingham, Michigan, United States

  • -

  • -

  • -

    Georgia

  • -

    United Kingdom

  • -

    Birmingham, MI

  • -

    New Jersey

  • -

    Washington D.C. Metro Area

  • -

    Washington D.C. Metro Area

  • -

  • -

    Portland, Oregon Area

  • -

  • -

  • -

    Korea

  • -

  • -

    Australia

  • -

    Greater Atlanta Area

  • -

    Palo Alto, California

  • -

    Birmingham, Michigan

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

  • King's College London Graphic

    King's College London, U. of London

    Pass w/Distinction

    -

    War in the Modern World is an academically rigorous modern military history course that explores the post WWII developments in military organization, law of armed conflict, international relations, intelligence, and non-state actors.

  • -

    -

  • -

    -

Publications

Patents

Courses

  • Intelligence in War

    -

  • The Early Cold War (1945-1975)

    -

  • The End of the Cold War (1985-1991)

    -

Projects

  • Introduction to Hacking For Dummies, 5th Edition

    Learn to hack your own system to protect against malicious attacks from outside

    Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability…

    Learn to hack your own system to protect against malicious attacks from outside

    Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, and security best practices.

    Other creators
    See project
  • Cyber Warfare: A Multidisciplinary Analysis (Routledge Studies in Conflict, Security and Technology)

    I contributed the first chapter, titled "A Short History of Cyber Warfare" to this edited collection. Available April, 2015.

    See project
  • UP and to the RIGHT

    -

    A book of strategy and tactics of analyst relations.

    See project
  • Surviving Cyberwar

    -

    A history of nation state cyber conflict.

    See project
  • Book: There Will Be Cyberwar

    -

    The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars. Now on Amazon: http://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784

    See project

Honors & Awards

  • Top Cyber Pro

    Top Cyber Pro

    https://topcyberpro.com/richard-stiennon/

  • Top Cybersecurity Twitter Accounts to Follow in 2022

    Security Scorecard

    https://securityscorecard.com/blog/top-cybersecurity-twitter-accounts

  • Big Data & Analytics Hero

    IBM

    Richard Stiennon is a veteran of the security industry, and as an industry analyst he has gained years of experience advising enterprises, vendors and government agencies on their security strategies. Stiennon is the author of Surviving Cyberwar and There Will Be Cyberwar. Cyber attacks are a real and ever-present threat that behooves all of us to employ every tool, including analytics, to minimize cyber threats. http://www.ibmbigdatahub.com/big-data-analytics-hero/richard-stiennon

  • Four Cybersecurity Gurus to Follow on Twitter

    FCW

    http://fcw.com/articles/2014/09/30/4-cybersecurity-gurus-to-follow-on-twitter.aspx

    2. Richard Stiennon (@stiennon and @cyberwar), executive editor of SecurityCurrent and founder of IT-Harvest

    Stiennon is a regular commentator on cybersecurity for Forbes. His recent posts have examined the possibility of another leaker at the National Security Agency and have defended former NSA Director Gen. Keith Alexander for reportedly charging six to seven figures for his consulting…

    http://fcw.com/articles/2014/09/30/4-cybersecurity-gurus-to-follow-on-twitter.aspx

    2. Richard Stiennon (@stiennon and @cyberwar), executive editor of SecurityCurrent and founder of IT-Harvest

    Stiennon is a regular commentator on cybersecurity for Forbes. His recent posts have examined the possibility of another leaker at the National Security Agency and have defended former NSA Director Gen. Keith Alexander for reportedly charging six to seven figures for his consulting services.

    Stiennon's articulation of what he has called the "IT security mindset" could help bridge a gap between policy-makers and cybersecurity gurus. When several IT commentators lashed out at White House Cybersecurity Coordinator Michael Daniel for recently arguing for a less technical approach to cybersecurity, Stiennon offered a measured response, saying, "It's the role that is at fault here, not Mr. Daniel or anyone else chosen to be the cybersecurity policy coordinator."

  • Security Change Agent

    Digital Gaurdian

    One of the best security analysts on the globe.
    by Phil Redman, VP Mobile Solutions & Strategy, Citrix

    Richard Stiennon is known as one of the best security analysts on the globe. He is the Chief Research Analyst of IT-Harvest, a leading security research firm, and Executive Editor of securitycurrent, a security news and analysis community for CISOs.


    https://digitalguardian.com/about/security-change-agents/richard-stiennon

  • 50 Most Powerful People in Networking

    Network World Magazine

    https://www.networkworld.com/article/2329284/the-50-most-powerful-people-in-networking.html?page=2
    Number 30. Stiennon rocked the security world with his June report that said intrusion-detection systems (IDS) were "a market failure." Rare is the analyst that will tell it like it is about an emerging market, one chock-full of potential new analyst-report customers. His stance powerfully influenced IDS makers - forcing them to address their failings now or risk sales. The "IDS is dead"…

    https://www.networkworld.com/article/2329284/the-50-most-powerful-people-in-networking.html?page=2
    Number 30. Stiennon rocked the security world with his June report that said intrusion-detection systems (IDS) were "a market failure." Rare is the analyst that will tell it like it is about an emerging market, one chock-full of potential new analyst-report customers. His stance powerfully influenced IDS makers - forcing them to address their failings now or risk sales. The "IDS is dead" report, as it is now widely known, was so influential that months after publication, in October, it prompted a roomful of prospective government IDS buyers to invite Stiennon to a face-off with a handful of IDS vendors.

Languages

  • French

    -

Recommendations received

14 people have recommended Richard

Join now to view

View Richard’s full profile

  • See who you know in common
  • Get introduced
  • Contact Richard directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses