Meet the Author

Jon Matthews

Jon Matthews

Jon Matthews is a highly experienced and trusted leader in computer and network forensics with over twelve years of experience. He leads investigations around high-profile digital forensic and incident response matters helping clients determine the root cause and extent of breaches.

Jon retired from the U.S. Army with over 20 years of service. He was a Special Agent with U.S. Army Counterintelligence for nine years and specialized in digital forensics for espionage and APT investigations. Jon also worked with Aon’s Cyber Solutions (Stroz Friedberg) leading their Washington, DC forensic lab and conducting digital forensic and incident response investigations for two and a half years.

Education, Certifications, and Training: Jon holds a Bachelor of Science degree in Computer Networks Security from the University of Maryland University College, and holds a Graduate Certificate in Incident Response from the SANS Technology Institute. Jon was a certified Computer Crime Investigator while working in the U.S. Army. His certifications include being a CISSP, Certified Incident Handler, Certified Forensic Analyst, Network Forensic Analyst, Reverse Engineering Malware, Advanced Smartphone Forensics, Certified Ethical Hacker, Secure Infrastructure Specialist, A +, Network +, and Security +.

Jon Matthews Articles

What are the Different Types of Security Controls in Cybersecurity?

What are the Different Types of Security Controls in Cybersecurity?

Articles

2 min read

Five of the Top Proactive Cybersecurity Measures

Five of the Top Proactive Cybersecurity Measures

Articles

3 min read

Threat Modeling: More than Checking for Tripping Hazards on the Runway

Threat Modeling: More than Checking for Tripping Hazards on the Runway

Articles

3 min read

How Do Threat Actors Gain Access Into Networks?

How Do Threat Actors Gain Access Into Networks?

Articles

5 min read

How To Prevent A Data Breach In Your Healthcare Organization [Updated]

How To Prevent A Data Breach In Your Healthcare Organization [Updated]

Articles

4 min read

Ransomware and Common Attack Vectors

Ransomware and Common Attack Vectors

Articles

3 min read

Important Information Regarding Spring Framework Remote Code Execution (CVE-2022-22965)

Important Information Regarding Spring Framework Remote Code Execution (CVE-2022-22965)

Blog Post

1 min read

Cybersecurity Facts: What is Ransomware and How to Avoid Becoming a Victim?

Cybersecurity Facts: What is Ransomware and How to Avoid Becoming a Victim?

Articles

4 min read

The Cyber Kill Chain

The Cyber Kill Chain

Articles

4 min read

CISA says ‘Shields Up’ and Warns of Possible Russian Cyberattacks as Invasion Fears Mount

CISA says ‘Shields Up’ and Warns of Possible Russian Cyberattacks as Invasion Fears Mount

Articles

1 min read

4 Tactics to Protect Against Harmful Ransomware

4 Tactics to Protect Against Harmful Ransomware

Articles

5 min read

4 Steps To Protect Your Cloud Environment with SIEM

4 Steps To Protect Your Cloud Environment with SIEM

Articles

2 min read