Meet Our Authors

Brad Bowers

Senior Security Architect

Brad Bowers brings 20 years of technology and security leadership experience to his role as Senior Security Architect at SHI. Brad helps SHI customers identify and implement security solutions, maintain compliance, and align security programs to best-practice frameworks. Prior to joining SHI, Brad managed and directed security operations, threat and vulnerability management, and compliance teams for organizations in the financial services, government, and managed services sectors. Brad holds a number of industry certifications, including CISSP, GCIA, GCIH, GCFA, and OSCP.

Recent Content by Brad Bowers

Conquer third-party risks and boost cyber resiliency now with these helpful steps

November 28, 2022
For third-party risks to your network, you need to know your weak points, your adversaries, and your options.

How SHI Complete makes enhancing the virtual CISO easy

November 3, 2022
Virtual CISOs can help you address the cybersecurity industry's 0% unemployment rate. But why stop there?

How expert virtual CISOs can protect organizations – and save resources

October 26, 2022
The cybersecurity industry's limited applicant pool could be problematic. But it doesn't have to be.

Expert insight: Can we predict the future of zero trust?

October 14, 2022
Is the zero trust security model mature enough to secure your organization against future cyberthreats?

Expert advice: The solutions you need to make zero trust work

October 7, 2022
Identify the crucial steps you need to take to achieve your own zero trust transformation.

Experts tell all: How zero trust bolsters your cybersecurity posture

September 20, 2022
What makes an effective zero trust strategy, and how can it create a holistic security solution?

The Houdini of hackers: An interview with Kevin Mitnick

February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.

How to improve threat detection and response with MITRE ATT&CK

June 11, 2020
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).

You May Be Interested In