Advertisement · 728 × 90

Posts by Allie Mellen

Amazon.com

Code War is now out on audiobook!! Listen here: a.co/d/03cREoCi

5 days ago 0 0 0 0
Preview
Code War: How Nations Hack, Spy, and Shape the Digital Battlefield Code War: How Nations Hack, Spy, and Shape the Digital Battlefield [Mellen, Allie] on Amazon.com. *FREE* shipping on qualifying offers. Code War: How Nations Hack, Spy, and Shape the Digital Battlefield

‼️‼️ review Code War on Amazon! As a new author, reviews make all the difference. Support my work and write a review! a.co/d/01mIFf1n

1 week ago 0 0 0 0
Post image Post image

Code War is in @barnesandnoble.com !!! Go get your copy and send me a pic!!

1 month ago 1 0 0 0
Video

I’m thrilled to say that my new book Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, is now available wherever books are sold!! 🎉

Go read it and let me know what you think! I can’t wait to hear from you. bit.ly/m/codewar

1 month ago 0 0 0 0
Preview
Watch Iran War Has Firms on High Alert for Cyber Threats - Bloomberg Companies should be actively prepared for cyberattacks in this threat environment, says Allie Mellen, a cyber analyst at Forrester Research and author of the new book, "Code War." Mellen discusses the...

Had a great conversation earlier today on @bloomberg.com, talking about Iran and the potential for future related cyberattacks. Check out the replay! ⬇️

www.bloomberg.com/news/videos/...

1 month ago 0 1 0 0

Let me know what you think!!

1 month ago 1 0 0 0
Post image

The latest episode of The Phillip Wylie Show has dropped, featuring @hackerxbella.bsky.social!

Catch the latest episode:
📺 YouTube: lnkd.in/emzBW82H
🎧 Spotify: lnkd.in/eCfkwC5Z
🍎 Apple: lnkd.in/gkfjJecz

1 month ago 1 1 0 0

Yes! I included the US in this is to give it the full treatment just like Russia and China. It’s more difficult because so many researchers are western, but there’s good and bad things for each nation state in this book. It was important to me to deliver a well-rounded perspective.

1 month ago 1 0 1 0
Post image

Code War is the #1 New Release in Computer Hacking!! Copies are shipping, get yours now! bit.ly/m/codewar

1 month ago 1 1 1 0
Advertisement
Preview
Stryker becomes a proxy target of cyberattacks in the 2026 Iran war Read the latest on how Stryker was hit with a cyberattack by pro-Iran hackers on March 11 that erased many of their Windows systems and mobile devices.

back on The Latest Breach, a review of the cyberattack on Stryker: open.substack.com/pub/hackerxb...

1 month ago 0 0 0 0
Video

My new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, is available for pre-order now! ⬇️ ⬇️ ⬇️

Pre-order it here: bit.ly/4aJj2Ep

2 months ago 0 0 0 0
Preview
Code War: How Nations Hack, Spy, and Shape the Digital Battlefield <p><b>An incisive exploration of how cyberattacks are transforming geopolitics</b></p> <p>Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential c...

When I began writing Code War, I didn’t imagine just how timely its lessons would be. Because of this, I'm opening up my calendar for book signings, keynotes, fireside chats, etc.

If you’re hosting an event, let’s make it unforgettable. DM me! 📩

www.wiley.com/en-us/Code+W...

2 months ago 0 0 0 0
Preview
Timeline: How the Shooting of Alex Jeffrey Pretti Unfolded A moment-by-moment analysis of video from the scene shows that Mr. Pretti was already restrained when fatal shots were fired, which appears to contradict the federal government’s account of the event.

He was restrained. He had not pulled a weapon. They shot him ten times. www.nytimes.com/interactive/...

2 months ago 2 0 0 0
Preview
ICE detainee passes away at Georgia’s Robert A. Deyton Detention Center On Jan. 14, 2025, Heber Sanchaz Domínguez, a 34-year-old Mexican national, passed away while in U.S. Immigration and Customs Enforcement custody at the Robert A. Deyton Detention Center. He was pronou...

ICE confirms 5th in-custody death of 2026.

www.ice.gov/news/release...

3 months ago 550 392 45 88
Preview
Code War: How Nations Hack, Spy, and Shape the Digital Battlefield Code War: How Nations Hack, Spy, and Shape the Digital Battlefield [Mellen, Allie] on Amazon.com. *FREE* shipping on qualifying offers. Code War: How Nations Hack, Spy, and Shape the Digital Battlefield

I have some big news: I wrote my first book! And it's available for preorder! 🙈

If you want to wish me a happy holiday this season, PLEASE preorder it!

Preorder it here:
www.amazon.com/-/es/Code-Wa...

www.barnesandnoble.com/w/code-war-a...

4 months ago 2 0 0 0
Preview
CrowdStrike Researchers Identify Hidden Vulnerabilities in AI-Coded Software CrowdStrike researchers reveal how trigger words cause DeepSeek-R1 to generate vulnerable code—exposing new AI-driven risks in software development.

"For example, when telling DeepSeek-R1 that it was coding for an industrial control system based in Tibet, the likelihood of it generating code with severe vulnerabilities increased to 27.2%." if you're considering using DeepSeek, read this @crowdstrike.com www.crowdstrike.com/en-us/blog/c...

5 months ago 1 0 0 0

Breaking: The FCC has voted 2-1 along party lines to eliminate cybersecurity requirements for telecom companies that the commission adopted at the end of the Biden administration.

Telecoms had lobbied for the change. Democrats said it would invite another Salt Typhoon.

Story coming shortly.

5 months ago 217 93 7 38
Advertisement
Preview
How did CrowdStrike’s outage impact IT teams? The impacts of last year’s CrowdStrike disruption from IT pros who experienced it.

great piece in ITBrew by Billy Hurley, looking back a year later - www.itbrew.com/stories/2025...

5 months ago 1 0 0 0
Preview
Gold Rush Or Fool’s Gold? How To Evaluate Security Tools’ Generative AI Claims Generative AI features and products for security are gaining significant traction in the market. Knowing how to evaluate them, however, remains a mystery. What makes a good AI feature? How do we know ...

Sometimes, GenAI features are useful. Others are useless, and worse, sometimes just wrong. 😾

When software is non-deterministic, we need new ways to evaluate its utility, the trust we should put in it, and how we should plan to pay for it. Read more:

www.forrester.com/blogs/gold-r...

5 months ago 0 0 0 0

There are big differences between invoking AI in an application, building an AI agent, and building an agentic system.

These terms are being conflated, and it’s confusing the market at a time when we ALL need to understand this stuff. Read our explainer:

www.forrester.com/blogs/your-t...

6 months ago 0 0 0 0
Qualtrics Survey | Qualtrics Experience Management The most powerful, simple and trusted way to gather experience data. Start your journey to experience management and try a free account today.

💥 SURVEY REMINDER: If you have not filled out our research survey on how generative AI is and will be used in security tools, PLEASE DO SO!! 💥

Deadline is THIS FRIDAY!!

forrester.co1.qualtrics.com/jfe/form/SV_...

7 months ago 1 0 0 0
Preview
HR giant Workday says hackers stole personal data in recent breach | TechCrunch The HR tech giant said it had no indication of any unauthorized access to customer systems, but has not ruled out a breach affecting customers' personal information.

New: Workday disclosed a data breach affecting a third-party customer database, likely Salesforce.

Workday hasn't explicitly ruled out a breach of customer info, but says the data includes contact information.

(FYI, Workday has hidden its breach notice from search engines using "noindex" code.)

8 months ago 68 42 2 5

🚨HELP our latest Generative AI in security tools research! 🚨

VENDORS, complete this survey!

PRACTITIONERS, if you are building genAI tools for your team or using them and want to tell us about it, message me!

forrester.co1.qualtrics.com/jfe/form/SV_bQ…

8 months ago 1 0 0 0
Post image

Just had another great conversation with @cloudsecuritypod.bsky.social !! Stay tuned for when it drops

8 months ago 0 0 0 0
Preview
Drowning In Security Data Costs? You Get A Data Lake Get tips on how data lakes can help manage growing data costs in the security information and event management (SIEM) system.

@microsoft.com announced two new features in Sentinel today.

1) Data Lake for low-cost, long-term storage to help manage Sentinel costs

2) MDTI will be included in Sentinel and Defender XDR at no additional cost later this year

Read more - www.forrester.com/blogs/drowni...

8 months ago 1 0 0 0
Preview
Announcing The Forrester Wave™: Security Analytics Platforms, 2025 – The SIEM Vs XDR Fight Intensifies The Forrester Wave™: Security Analytics Platforms, Q2 2025 published today and illustrates the dramatic changes this market is undergoing as legacy SIEM vendors are locked in heated competition with s...

I'm very excited to announce that the Forrester Wave: Security Analytics Platforms 2025 is now LIVE! 💥 💥 💥

Read the blog (and the full report!) here: www.forrester.com/blogs/announ...

9 months ago 1 0 0 0
Preview
Is the future of the SOC autonomous? A Q&A with Forrester's Allie Mellen | Tines Allie Mellen, Principal Analyst at Forrester Research, answers follow-up questions on the future of SOC automation and the role of genAI.

Is the SOC of the future autonomous?

That’s the question we tackled with Tines CEO Eoin Hinchy and guest speaker Forrester’s @hackerxbella.bsky.social in a recent webinar - and the discussion didn’t stop there.

Read our follow-up Q&A:
www.tines.com/blog/autonom...

10 months ago 2 1 0 0
Advertisement
Preview
Protecting your privacy goes hand in hand with protecting encryption Don't willingly take the locks off your house.

Today on the latest breach: the Florida bill failed to pass, but encryption is still under attack. Here's why we need to protect it (for your own privacy!):
open.substack.com/pub/hackerxb...

11 months ago 0 0 0 0

💯

11 months ago 0 0 0 0