Meet Our Authors

Brad Bowers

Senior Security Architect

Brad Bowers brings 20 years of technology and security leadership experience to his role as Senior Security Architect at SHI. Brad helps SHI customers identify and implement security solutions, maintain compliance, and align security programs to best-practice frameworks. Prior to joining SHI, Brad managed and directed security operations, threat and vulnerability management, and compliance teams for organizations in the financial services, government, and managed services sectors. Brad holds a number of industry certifications, including CISSP, GCIA, GCIH, GCFA, and OSCP.

Recent Content by Brad Bowers

How to harness AI and machine learning for proactive threat detection:
Ensure your business is safe no matter what cyber threat arises

August 23, 2024
Cybercriminals use AI and machine learning to sharpen attacks. Companies must fight back with the same tools.

Conquer third-party risks and boost cyber resiliency now with these helpful steps:
Your “quadruple A” guide to cyber safety

November 28, 2022
For third-party risks to your network, you need to know your weak points, your adversaries, and your options.

How SHI Complete makes enhancing the virtual CISO easy:
Combine a vCISO with a managed service designed to help your business meet all its cybersecurity goals

November 3, 2022
Virtual CISOs can help you address the cybersecurity industry's 0% unemployment rate. But why stop there?

How expert virtual CISOs can protect organizations – and save resources:
Strategies to address the limited applicant pool in the cybersecurity industry

October 26, 2022
The cybersecurity industry's limited applicant pool could be problematic. But it doesn't have to be.

The Houdini of hackers: An interview with Kevin Mitnick

February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.

How to improve threat detection and response with MITRE ATT&CK:
A compelling way to move toward a more threat-informed defense

June 11, 2020
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).

You May Be Interested In