Stuart McClure · Cybersecurity
Stuart McClure
Portrait · v2.0

Academic & Education

6 items

Actor Credits

5 credits

Articles

36 articles
Article · Fast Company · Jan 2024
Safeguarding from Lurking Threats in Business Logic Flaws
Jan 25, 2024
Stuart's Fast Company article on the overlooked dangers of business logic flaws and how to defend against them.
Article · Forbes · Jul 2016
Duelling Unicorns: CrowdStrike vs. Cylance in Brutal Battle to Knock Hackers Out
Jul 25, 2016
Forbes profiles the fierce competition between CrowdStrike and Cylance — two cybersecurity unicorns taking fundamentally different approaches to stopping hackers.
Article · Chicago Tribune · Aug 2012
Experts Hope to Protect Cars from Computer Viruses
Aug 30, 2012
Chicago Tribune's Focus Cyber Security report on automotive hacking risks, quoting Stuart McClure on vehicle cybersecurity vulnerabilities.
Article · Unite.ai · May 2024
Clearing the 'Fog of More' in Cyber Security — Unite.ai
May 31, 2024
Stuart on how the proliferation of security tools creates a 'fog of more' that weakens organizational defenses.
Article · OCBJ · Jul 2022
OC's Long-Term Economic Prosperity Relies on Artificial Intelligence — OCBJ
Jul 20, 2022
Stuart's op-ed arguing that Orange County's future economic growth depends on embracing AI.
Article · OCBJ · Jan 2023
2022 Leader Boards: A Look Back — OCBJ
Jan 4, 2023
Orange County Business Journal's 2022 Leader Boards retrospective featuring Stuart McClure.
Memoir · Personal
Guardians of the Machine Age: The Gift of a Second Chance
Mar 11, 2026
Stuart's memoir tracing the unbroken thread from surviving United Flight 811 to founding Cylance and WethosAI — a lifelong quest to find and fix the faulty latches of the world.
Article · Irvine Standard · May 2018
Meet the Man Who's Making Your Computers Safer — Irvine Standard
May 23, 2018
Profile of Stuart and Cylance's mission to revolutionize cybersecurity with AI from Irvine, California.
Article · Ackcent · May 2019
Ackcent Above and Beyond in Spain with Stuart McClure, President and Founder at Cylance
May 30, 2019
Stuart discusses Cylance's expansion into Spain and the partnership with Ackcent for AI-driven cybersecurity.
Article · Security Journey · Feb 2025
Experts Reveal How Agentic AI Is Shaping Cybersecurity in 2025
Feb 2025
Stuart shares expert insights on how agentic AI is transforming the cybersecurity landscape in 2025.
Article · OCBJ · Nov 2025
OC500 2025: Stuart McClure
Nov 17, 2025
Stuart named to Orange County Business Journal's OC500 list of the most influential people in Orange County for 2025.
Article · SecurityWeek · Dec 2011
McAfee Names Stuart McClure Worldwide CTO — SecurityWeek
Dec 6, 2011
SecurityWeek covers Stuart's appointment as McAfee's Worldwide Chief Technology Officer.
Article · Dark Reading · Jan 2014
McClure: Hacking Exposed — Dark Reading
Jan 7, 2014
Stuart on surviving a plane crash, witnessing the Morris worm firsthand, and the journey from hacking a college buddy's password to building Cylance.
Article · Fast Company · 2024
Utilizing AI to Improve Application Development
2024
Stuart's Fast Company article on how AI is transforming the application development lifecycle.
Article · Fast Company
Moving Beyond Detect & Respond: How GenAI Is Revolutionizing Cybersecurity
2024
Stuart argues the industry must shift from reactive detection to proactive AI prevention.
Article · AP · 2016
Opportunities to Stop OPM Cyber Breach Missed
Sep 2016
AP report on the OPM breach quoting Cylance CEO Stuart McClure on the government's missed opportunities to stop the hackers.
Article · Reuters · 2014
Iranian Hackers Infiltrate Systems
2014
Reuters reports on Cylance's Operation Cleaver exposing Iranian state-sponsored hackers, featuring CEO Stuart McClure.
Article · Newspaper
Private Firms Take Major Role vs. Cyberattacks
2013
Stuart McClure featured in a major newspaper piece on the private sector's growing role in defending against cyberattacks.
Article · Newspaper
Is Mandiant a 'Digital Blackwater'?
2013
Stuart McClure featured in a deep examination of private cybersecurity firms and their role in cyber-espionage investigations.
Article · AP
Private Security Firms Taking Big Role Fighting Cyberattacks
2013
AP examines the rise of private cybersecurity firms in national defense, featuring Stuart McClure among industry leaders.
Article · LA Times · 2013
Trying to Read Hackers' Minds
Jul 2013
LA Times profiles Cylance's AI-driven approach to cybersecurity.
Article · Reuters · 2013
Hacker Barnaby Jack Dies a Week Before Hacking Convention
Jul 2013
Reuters obituary quoting Stuart McClure on Barnaby Jack, who he gave one of his first jobs at McAfee.
Fast Company Article · Fast Company · 2012
Cylance Founder Stuart McClure Finds Success In Slowing Down
2012
Fast Company profile on Stuart leaving McAfee CTO to found Cylance and the lessons learned from slowing down.
Article · AFP
Cars Next Frontier for Hackers, Report Warns
2012
Stuart McClure quoted on automotive cybersecurity risks in McAfee's "Caution: Malware Ahead" report.
Article · Chicago Tribune
What Computers Control in Your Car
2011
Chicago Tribune's Focus Cyber Security report on automotive hacking risks, quoting Stuart McClure on vehicle vulnerabilities.
Article · Newspaper
Cyber Attack Target: Your Car
2011
Stuart McClure warns about the future of automotive cybersecurity as connected vehicles become increasingly vulnerable.
Article · LA Times
New State Team to Combat Tech Crime
2011
LA Times on AG Kamala Harris's new eCrime Unit, with McAfee CTO Stuart McClure on bringing tech criminals to justice.
Article · Newspaper · 2005
Fighting Off 'Hack Attack'
May 2005
RIT and McAfee celebrate their partnership with a cybersecurity competition where Stuart delivered the keynote.
Article · Windsor Star · 2004
Security Expert Warns of Hacking
Nov 2004
Stuart McClure warns governments and corporations about the growing threat of politically motivated hacking.
Article · Newspaper
Beware Political Hackers: Expert
2004
Stuart McClure warns about the growing threat of politically motivated hacking targeting governments and corporations.
Article · CIO Magazine
Hacking Exposed Author Reveals His Security Secrets
2003
CIO Magazine interview where Stuart reveals the security strategies behind the Hacking Exposed book series.
Article · Newspaper
Digital Trail Not Difficult to Follow
2000
Stuart McClure and Joel Scambray examine the digital footprints we leave behind and the privacy implications of a connected world.
Article · Washington Post
2600 Club Motivates People to Pursue Loftier Goals
2000
Washington Post profiles the 2600 hacker club with Stuart McClure quoted as a leading security expert.
Article · Newspaper
Many Computer Hackers Believe They're Doing Good
2000
Profile of the hacker community referencing Stuart McClure's Hacking Exposed as essential security reading.
Article · Newspaper
Teenage Hacker Charged: Experts Say Attack on eBay, Amazon 'Very, Very Simple'
2000
Stuart McClure quoted on the simplicity of the denial-of-service attacks against eBay and Amazon.
Book Review · Albuquerque Journal
'Exposed' a Cautionary Hacker Tale
1999
Albuquerque Journal reviews Hacking Exposed by Stuart McClure — "be afraid, or at the very least, be cautious."

Awards & Recognition

8 awards

Blogs

32 posts
Blog · ATD
The Creative Generalist: Thriving in the AI Era
Aug 25, 2025
Stuart argues the future belongs to "creative generalists" — those who combine breadth of knowledge with AI fluency to thrive in the new world of work.
Blog · Wethos AI
WethosAI Manifesto: Hacking Human Potential
2024
The founding manifesto for Wethos AI and its vision for AI-augmented human performance.
Blog · LinkedIn
System 3 Thinking: Beyond System 1 and System 2
Oct 2025
Introduces a new cognitive framework beyond Kahneman's System 1 and 2 thinking.
Blog · LinkedIn
The Efficient Compute Frontier
Oct 2025
Argues that scaling AI model size has diminishing returns and the future is efficient, targeted AI.
Blog · LinkedIn
The Human Brain in the Age of AI
Oct 2025
Explores what makes human cognition irreplaceable even as AI advances.
Blog · LinkedIn
The Human-AI Reasoning Trifecta
Sep 2025
Stuart's framework for combining human and AI reasoning capabilities.
Blog · LinkedIn
Is AI the New Phrenology?
Sep 2025
A provocative comparison asking whether AI behavioral prediction is as flawed as 19th-century pseudoscience.
Blog · LinkedIn
The Cost of the Head Nod: How False Consensus Effect Hurts Companies
Dec 2025
How groupthink damages organizations more than cyberattacks.
Blog · LinkedIn
The Troxler Blind Spot
Nov 2025
Uses the Troxler fading optical illusion as a metaphor for organizational blind spots.
Blog · Wethos AI
The AI Hype Must Die
Jan 2, 2025
Stuart's original manifesto declaring that AI hype is dangerous and must be replaced with realistic expectations.
Blog · Fast Company
Navigating Developer Fatigue in the Cybersecurity Battlefield
2024
Stuart discusses the risks of security tool overload on developers and AI-powered solutions.
Blog · LinkedIn
A.I. for Good
2018
Stuart explores the positive social applications of artificial intelligence beyond security.
Blog · Qwiet AI
Modern AppSec at AI Speed
2023
Stuart on how AI is transforming the pace and effectiveness of application security testing.
Blog · Cylance · 2014
The Allegory of the Cave
2014
Stuart draws parallels between Plato's cave and the cybersecurity industry's blind faith in signature-based detection.
Blog · LinkedIn
42: The Answer to the Ultimate Question
2016
Stuart's philosophical reflection connecting Douglas Adams' famous answer to the pursuit of meaning in technology.
Blog
What's in a Name?
2014
On the power of naming and branding in the technology industry.
Blog
Addressing Everything but the Problem — Part 1
2015
Why companies consistently solve the wrong problems in cybersecurity.
Blog
Addressing Everything but the Problem — Part 2
2015
Continuing the case for addressing root causes rather than symptoms in security.
Blog · Cylance
CylancePROTECT vs. the Real World: Equation Group
2015
Live demonstration of CylancePROTECT defending against the NSA-linked Equation Group malware.
Blog · Cylance
CylancePROTECT vs. the World: Carbanak Banking Malware
2015
Live demonstration of CylancePROTECT stopping the Carbanak banking trojan that stole over $1 billion.
Blog
Four Years, Four Rounds, One Mission
2016
Blog
AI vs. AV - Gorillas and Germans and Gartner, oh my…
2017
Blog
How A.I. Could Be Our Most Intelligent Defense
2016
Blog
Infinity vs. the Real World: MS Word Vulnerability (CVE-2014-1761)
2014
Blog
Infinity vs. The Real World: Round 2
2015
Blog
Know the Truth: Signatures and Multi-AV Scanners
2015
Blog
Look Who "Checked Our Math"!
2016
Blog
Spam, meet spam-killer. Math.
2015
Blog
Yahoo Serving Ads with a Side of Malware
2014
Memoir · Cylance · 2016
Four Years, Four Rounds, One Mission
2016
Stuart reflects on Cylance's journey from founding through four funding rounds.
Memoir · Cylance · 2012
Why Cylance?
2012
Stuart's memoir on United Flight 811 and the life-defining passion that led to founding Cylance.
Memoir · Cylance · 2013
Why Cylance? (Part 2)
2013
The deeper story behind building the world's first AI-driven endpoint security company.

Boards

16 boards

Advisor

Acquired

Acquired Advisory Board · 2024–2025
MightyID → Semperis — C-Suite Advisory Board (2024–2025, acquired 2025)
2024
Joined the MightyID C-Suite Advisory Board, advising on strategic initiatives for their identity resilience platform. Acquired by Semperis in 2025.
Acquired Board · CEO · 2020–2025
Qwiet AI → Harness — CEO & Board (2020–2025, acquired 2025)
2020
Served as CEO and board member of Qwiet AI, an AI-powered application security platform. Acquired by Harness in September 2025.
Acquired Board of Directors · 2015–2016
Optiv → KKR — Board of Directors (2015–2016)
2015
Served on the board of directors of Optiv, a leading cybersecurity solutions integrator. Acquired by KKR.
Acquired Board of Directors · 2015
Digital Shadows → ReliaQuest — Board of Directors (2015, acquired 2022)
2015
Appointed to the board of Digital Shadows, a cyber threat intelligence and digital risk protection company. Acquired by ReliaQuest in 2022.
Acquired Board of Directors · 2017
JASK → Sumo Logic — Board of Directors (2017, acquired 2019)
2017
Investor and board member at JASK, an autonomous security operations platform using AI-driven alert triage. Acquired by Sumo Logic in 2019.
Acquired Founder · Board · 1999–2004
Foundstone → McAfee — Founder & Board (1999–2004, acquired 2004)
1999
Co-founded Foundstone, a security consulting and vulnerability management firm. Acquired by McAfee in 2004.
Acquired Founder · Board · 2012–2019
Cylance → BlackBerry — Founder & Board (2012–2019, acquired 2019)
2012
Co-founded Cylance, AI/ML endpoint security pioneer. Acquired by BlackBerry for $1.5B in February 2019.

Books

13 titles

Founding / Lead Author

Co-Author

Contributing Author

Reviews

Campaigns

6 campaigns

Companies

7 ventures

Founded

Led

Exits

9 acquisitions

Founder / Leadership

Board / Advisor

Forewords Written

6 books

InfoWorld Archive

132 columns & articles

Articles (40)

InfoWorld Article · Mar 2000
Hack your network and management will come
Mar 16, 2000
InfoWorld Article · Feb 1999
WSA offers solid security, great GUI
Feb 15, 1999
InfoWorld Article · Jan 1999
Kane demonstrates its mettle as the final line of defense
Jan 11, 1999
InfoWorld Article · Oct 1998
Cute name belies gravity of latest NT attack
Oct 19, 1998
InfoWorld Article · Jul 1998
E&Y teaches the fine art of hacking at your site
Jul 27, 1998
InfoWorld Article · Mar 1998
How secure are your IBM legacy systems
Mar 16, 1998
InfoWorld Article · Dec 1998
VirusNet packs key scanning tools
Dec 21, 1998
InfoWorld Article · Dec 1998
SDTI improves solid security tool
Dec 14, 1998
InfoWorld Article · Nov 1998
Limited scope snags Netect tool
Nov 30, 1998
InfoWorld Article · Nov 1998
Jaws L5 delivers zippy security
Nov 23, 1998
InfoWorld Article · Sep 1998
CyberGuard offers hyper defense, lacks refinement
Sep 28, 1998
InfoWorld Article · Jul 1998
Lucent Bridges security gaps
Jul 13, 1998
InfoWorld Article · Apr 1998
Ballista 2.3 fortifies networks
Apr 20, 1998
InfoWorld Article · Feb 1998
Hidden assets boost Digital server
Feb 23, 1998
InfoWorld Article · Feb 1998
RealSecure is fast but needs polish
Feb 23, 1998
InfoWorld Article · Jan 1998
Internet Scanner fills the holes
Jan 26, 1998
InfoWorld Article · Oct 1997
Cisco's anticipated NSM surpasses all expectations
Oct 6, 1997
InfoWorld Article · Sep 1997
A note about the ANS ISP solution
Sep 22, 1997
InfoWorld Article · Sep 1997
Isolation Systems' VPN network toaster ready for prime time
Sep 22, 1997
InfoWorld Article · Jul 1997
VPN promise yet to be fulfilled
Jul 28, 1997
InfoWorld Article · Nov 1997
Siteminder upgrade shows solid progress
Nov 3, 1997
InfoWorld Article · Oct 1997
Comnet Predictor offers a host of impressive analysis features
Oct 13, 1997
InfoWorld Article · Sep 1997
Solaris 2.6 for Intranets gives Windows NT stiff competition
Sep 22, 1997
InfoWorld Article · Aug 1997
Cisco's DNS/DHCP manager breaks into Windows NT
Aug 4, 1997
InfoWorld Article · Jul 1997
RealSecure defends your network from the inside out
Jul 21, 1997
InfoWorld Article · Jul 1997
Application Expert pinpoints the source of slowdowns
Jul 14, 1997
InfoWorld Article · Jun 1997
Aventail delivers a highly secure, flexible VPN solution
Jun 23, 1997
InfoWorld Article · Jun 1997
e-Lock handles certificates
Jun 16, 1997
InfoWorld Article · Jun 1997
AltaVista firewall boasts impressive, security and remote management
Jun 9, 1997
InfoWorld Article · Mar 1997
Red Shift detects cracks in network security walls
Mar 24, 1997
InfoWorld Article · Mar 1997
Module adds NT diagnostics to Compas monitor
Mar 10, 1997
InfoWorld Article · Mar 1997
Simple, effective WebStalker pro bolsters NT security
Mar 3, 1997
InfoWorld Article · Dec 1996
Solstice eases managing global environments
Dec 2, 1996
InfoWorld Article · Nov 1996
Centri Firewall secures Windows NT networks
Nov 18, 1996
InfoWorld Article · Nov 1996
DSM 2.04 "enlightens" enterprise
Nov 11, 1996
InfoWorld Article · Nov 1996
Secure Access Firewall add-on provides a dynamic firewall in your Ascend routers
Nov 4, 1996
InfoWorld Article · Oct 1996
QIP addresses the enterprise
Oct 21, 1996
InfoWorld Article · Oct 1996
MatchBox ES-2420 provides unprecedented level of configuration
Oct 7, 1996
InfoWorld Article
PGP Brings Security to Masses
Oct 5, 1998
InfoWorld Article
Enterprise Platforms Manager
Jan 19, 1998

Security Watch Column (92)

Security Watch · Jan 2002
Personal firewall, user packet filtering share this year's Golden Guardian award
Jan 17, 2002
Security Watch · Jan 2001
Security cannot rest on one element: You also need full disclosure and varied technologies
Jan 8, 2001
Security Watch · Jan 2001
Effective code auditing can ease your worries and boost your application security
Jan 1, 2001
Security Watch · Jul 2000
An arsenal of attack tools is an essential part of any strong security defense
Jul 24, 2000
Security Watch · Jun 2000
Tracking an attack often provides little benefit; top deterrent is secure systems everywhere
Jun 26, 2000
Security Watch · May 2000
Internet security conference catches industry in transition with few new products
May 8, 2000
Security Watch · Feb 2000
Golden Guardian award runners-up present some encouraging news in security field
Feb 17, 2000
Security Watch · Jan 2000
RSA conference leaves us wondering what the next thing in security will be
Jan 31, 2000
Security Watch · Dec 2000
Once-promising intrusion detection systems stumble over switched networks
Dec 11, 2000
Security Watch · Dec 2000
Here's a little advice to help you defeat the Internet's leading Trojan horse viruses
Dec 4, 2000
Security Watch · Nov 2000
Honeynet Project's 'honey pot' a sweet success in trapping hacker attacks
Nov 27, 2000
Security Watch · Nov 2000
Mass manipulation isn't reserved just for presidential elections: IT world be warned
Nov 20, 2000
Security Watch · Nov 2000
Microsoft break-in teaches us the lesson of securing remote users systems
Nov 13, 2000
Security Watch · Nov 2000
Plethora of security advisories concerning IIS makes it hard to spot the serious ones
Nov 6, 2000
Security Watch · Oct 2000
Visa sets guidelines for safe transaction, forces security on (willing?) merchants
Oct 23, 2000
Security Watch · Oct 2000
Survey points out that lack of training is first barrier to improved network security
Oct 16, 2000
Security Watch · Oct 2000
Etrade makes the 'hit' parade: Client-side hacking captures a big-time victim
Oct 9, 2000
Security Watch · Oct 2000
Managed security or Web censorship? ISP's intrusion-detection system freezes usage
Oct 2, 2000
Security Watch · Sep 2000
Do you think that updating your anti-virus software is good enough? Think again
Sep 18, 2000
Security Watch · Sep 2000
The question of client-side Internet security problems: To block or not to block
Sep 4, 2000
Security Watch · Aug 2000
FBI's Carnivore highlights the need for public-source review, strong encryption
Aug 18, 2000
Security Watch · Aug 2000
Anti-hacking method of full disclosure under attack from a part of the security industry
Aug 14, 2000
Security Watch · Aug 2000
'Honey pot' network can gather evidence for catching and prosecuting hackers
Aug 7, 2000
Security Watch · Jul 2000
Most dangerous programming error threatens Outlook, Express clients
Jul 31, 2000
Security Watch · Jul 2000
Scrap file worm highlights another obscure yet unsecured feature of Windows
Jul 10, 2000
Security Watch · Jul 2000
Forget the firewall; guard your garbage against 'Dumpster diving' hackers
Jul 3, 2000
Security Watch · Jun 2000
'Invitation' to read files in Microsoft's IIS obscured by news of various vulnerabilities
Jun 5, 2000
Security Watch · May 2000
Security industry continues to argue over the sacred cow of full disclosure
May 1, 2000
Security Watch · Apr 2000
Growing vulnerabilities in e-commerce apps present the latest challenge to security
Apr 24, 2000
Security Watch · Apr 2000
Microsoft wants to be the one company to secure the Internet, but is it right for you?
Apr 17, 2000
Security Watch · Apr 2000
Will this be the year of public key security? Past and present join to suggest what's next
Apr 10, 2000
Security Watch · Mar 2000
Denial of service attacks make news, but application hacks continue to grow
Mar 13, 2000
Security Watch · Feb 2000
Predictable denial of service attacks come as a big surprise to media, government
Feb 21, 2000
Security Watch · Feb 2000
Windows 2000 looks like its learned several important lessons regarding security
Feb 7, 2000
Security Watch · Jan 2000
Hacking frenzy shows network security breaches are not about to go out of fashion
Jan 24, 2000
Security Watch · Jan 2000
Searching the mailbag reveals reader rants and snappy comebacks from our authorities
Jan 10, 2000
Security Watch · Jan 2000
New Year's is a time for reflection on the past, prediction for the future of the security business
Jan 3, 2000
Security Watch · Feb 1999
Beware of the obvious: Ubiquitous SNMP provides a backdoor to your network secrets
Feb 1, 1999
Security Watch · Nov 1999
Scanned your Web applications lately for security holes? Try these free audit tools
Nov 29, 1999
Security Watch · Jul 1999
Black Hat conference survives a denial-of-service attack, but will it outlast attrition?
Jul 19, 1999
Security Watch · Feb 1999
The more the merrier: 1998's Golden Guardian Award given to three top security solutions
Feb 15, 1999
Security Watch · Dec 1999
After Y2K will security garner attention it deserves, or will it be just another task?
Dec 20, 1999
Security Watch · Dec 1999
'Personal' marketing appeals to sellers and some consumers, but your privacy will suffer
Dec 13, 1999
Security Watch · Dec 1999
Firewalls are essential, but protecting the file system is what really keeps the snoops away
Dec 6, 1999
Security Watch · Nov 1999
Confused yet about NT passwords? Try the 7-14 rule; those numbers work better than most
Nov 22, 1999
Security Watch · Nov 1999
Microsoft and Novell compete in creating single Internet sign-on for your e-shopping
Nov 15, 1999
Security Watch · Nov 1999
OpenBSD comes close to security nirvana with a system that is 'secure by default'
Nov 8, 1999
Security Watch · Nov 1999
Hacking contest throws spotlight on the numerous methods for attacking Web sites
Nov 1, 1999
Security Watch · Sep 1999
Internet Explorer holes show off poor coding in Java implementation and ActiveX controls
Sep 20, 1999
Security Watch · Sep 1999
Are you beefing up your incident response teams for year 2000?
Sep 13, 1999
Security Watch · Aug 1999
Personal burglar alarms can ease your mind when taking NT into hostile environs
Aug 30, 1999
Security Watch · Aug 1999
Old IIS hack reborn: MDAC proves to be Windows NT's latest skeleton in the closet
Aug 23, 1999
Security Watch · Aug 1999
Future criminals will not need to steal from you – they will simply 'become you'
Aug 16, 1999
Security Watch · Aug 1999
Bane of e-commerce: 'We're secure, we only allow Web traffic through our firewall'
Aug 9, 1999
Security Watch · Jul 1999
Columnists debate: Does Back Orifice 2000 help or hinder your security efforts
Jul 26, 1999
Security Watch · Jul 1999
Windows NT remote buffer overflows now a real threat thanks to eEye security system
Jul 5, 1999
Security Watch · Apr 1999
Novell's Remote encrypted password falls victim to weak security measures
Apr 26, 1999
Security Watch · Apr 1999
Network Associates' Active Security model shows potential of automated security
Apr 19, 1999
Security Watch · Apr 1999
White-hat hacking: Separating the hype from the reality is an ongoing challenge
Apr 12, 1999
Security Watch · Apr 1999
Privacy issues: When it comes down to it, Intel and Microsoft could follow your every move
Apr 5, 1999
Security Watch · Mar 1999
Remotely controlling end users can provide bliss or nightmares to system administrators
Mar 8, 1999
Security Watch · Mar 1999
Kill-the-hacker stories make the progressives among us shudder at the thought... right?
Mar 1, 1999
Security Watch · Feb 1999
DNS due diligence is an important step in preventing crackers from accessing data
Feb 8, 1999
Security Watch · Jan 1999
New high-speed Net access services give unwanted snoopers a real opportunity
Jan 25, 1999
Security Watch · Jan 1999
Don't forget those unguarded modem lines when assessing your security risks
Jan 11, 1999
Security Watch · Dec 1998
Netbus hacker tool presents a greater threat to Windows shops than BackOrifice
Dec 14, 1998
Security Watch · Dec 1998
Help us pick our Golden Guardian: this year's best security product
Dec 7, 1998
Security Watch · Jul 1998
ICSA hacker insurance adds market muscle and peace of mind, but is it really worth it?
Jul 20, 1998
Security Watch · Jul 1998
Free Windows-based scanners are plentiful, but only Asmodeus shows promise
Jul 6, 1998
Security Watch · Nov 1998
NT Service Pack 4's Security Configuration Manager lightens the load of securing NT servers
Nov 23, 1998
Security Watch · Nov 1998
NT Service Pack 4 improves but raises inevitable questions
Nov 16, 1998
Security Watch · Dec 1998
'Tis the season for holiday-related hoaxes and hostile-content hacker mischief
Dec 21, 1998
Security Watch · Nov 1998
Windows NT leaks: Two denial-of-service attacks work their way past Service Pack 4
Nov 30, 1998
Security Watch · Nov 1998
Recent Rootshell hack reveals that ISPs may be the weakest link
Nov 9, 1998
Security Watch · Nov 1998
Is adaptive security the next step in the evolution of a secure computing platform?
Nov 2, 1998
Security Watch · Oct 1998
AS/400 security is still top notch, but diligent steps can help fortify it
Oct 12, 1998
Security Watch · Oct 1998
New York Times Web site hacker group unearths an important role for the media
Oct 5, 1998
Security Watch · Sep 1998
Microsoft's Virtual Private Networking: Is it safe to go back into the water with PPTP?
Sep 28, 1998
Security Watch · Sep 1998
The haze surrounding legal issues in the computer industry taints security as well
Sep 21, 1998
Security Watch · Sep 1998
Forget BackOrifice: Inventory Windows' shares and enforce password policies
Sep 14, 1998
Security Watch · Aug 1998
Security bug chinks armor of Eudora e-mail, reinforces need to keep Web, OS separate
Aug 31, 1998
Security Watch · Aug 1998
BackOrifice proves what we already knew: Win95/98 isn't secure
Aug 24, 1998
Security Watch · Aug 1998
Harry & Louise, SSL slips, and 56-bit DES cracks bring crypto into the spotlight
Aug 10, 1998
Security Watch · Aug 1998
Do you want some proof that NetWare is alive and well? People are still hacking it
Aug 3, 1998
Security Watch · Jul 1998
Unfortunately, you haven't heard the last about security issues with NTFS streams
Jul 27, 1998
Security Watch · Jul 1998
Could well-meaning legislation wipe out your right to hack?
Jul 13, 1998
Security Watch · Jul 1998
Virus threats of the past and present reveal current state of the digital immune system
Jul 12, 1998
Security Watch
NetWorld+Interop keeps security in focus as scores of vendors announce products
Sep 27, 1999
Security Watch
Are the recent denial of service attacks the security industry's 15 minutes of fame?
Mar 6, 2000
Security Watch
Boost your Windows NT security with tips and tricks from a dedicated vulnerabilities hunter
Mar 27, 2000
Security Watch
Despite security steps, popular remote-control programs can still give up the network farm
Mar 22, 1999
Security Watch
Looking back at 1998 sheds light on security gains and areas to fix in the next decade
Jan 4, 1999

Interviews

33 interviews
Video Interview · Converge! · Sep 2016
Converge! Network Digest — Cylance: AI and Cybersecurity
Sep 28, 2016
Stuart discusses Cylance's AI-driven approach to cybersecurity at the Converge! Network Digest event.
Video Interview · RSA 2022 · Sep 2022
LSEC & ECSO at RSA 2022 — Cybersecurity Innovations Fireside Chat
Sep 23, 2022
Stuart participates in a fireside chat on cybersecurity innovations at RSA Conference 2022 with LSEC and ECSO.
Video Interview · CBS News · Feb 2015
Hackers Steal $1 Billion from Up to 100 Banks — CBS News
Feb 16, 2015
Stuart provides expert analysis on CBS News about the massive Carbanak cyberattack that stole over $1 billion from banks worldwide.
Interview · Black Hat · Sep 2015
Black Hat Sponsor Interview — Stuart McClure, Cylance
Sep 23, 2015
Stuart discusses Cylance's AI-driven approach to endpoint security in this Black Hat sponsor interview.
Video Interview · World Economic Forum · Jun 2016
World Economic Forum — Davos: Technology Pioneer 2016
Jun 28, 2016
Stuart speaks at the World Economic Forum in Davos as a Technology Pioneer representing Cylance.
Video Interview · Jan 2024
Two Things That Make a Compelling Demo
Jan 19, 2024
Stuart shares the two essential elements that make product demonstrations truly compelling.
Video Interview · Cyber Confessions · Mar 2026
Why Your Phone is NEVER Truly Off — Cyber Confessions with Caitlin Sarian
Mar 11, 2026
Stuart joins Cybersecurity Girl to explain why powered-down phones aren't truly off, medical device hacking risks, and practical privacy strategies.
Video Interview · CBS News · Oct 2016
FBI Investigating Cyberattacks That Disrupted Twitter, PayPal and Spotify
Oct 16, 2016
Stuart provides expert analysis on CBS News about the massive DDoS attack that took down major internet services.
Interview · Help Net Security · Sep 2002
Interview with Stuart McClure, President and CTO of Foundstone — Help Net Security
Sep 12, 2002
Stuart discusses Foundstone's mission, vulnerability management, and the evolving cybersecurity threat landscape.
Video Interview · CyberVault
Is AI Finally Delivering on Its Promise in Cybersecurity? — The CyberVault
Oct 17, 2025
Stuart joins The CyberVault podcast to assess whether AI has lived up to its security promises.
Press · TechNadu 2025
Layered Defenses: Insecure AI Code & Exploit Chaining — TechNadu
Sep 30, 2025
Expert insights on evolving attacker methods and AI-generated code risks.
Press · Help Net Security 2024
Transforming Code Scanning with GenAI — Help Net Security
2024
Stuart on shifting from reactive fixes to proactive risk management in AppSec.
Interview · 2024
Rethinking Work, Hiring & High-Performing Teams — Product Leaders Journey
2024
Conversation on the future of work and AI-assisted hiring.
Video Masterclass
ZeroToExit 2021: Masterclass on Security and Company Building
2021
An extended masterclass-format interview covering security strategy and startup lessons.
Interview · Nightfall AI
A Chat with Infosec Innovator & Investor Stuart McClure (Nightfall AI)
2020
Nightfall AI's 2020 profile interview covering Stuart's investment philosophy and views on the security landscape.
Video Interview · CXOTalk
Adversarial AI & Cybersecurity — CXOTalk
2019
Stuart discusses adversarial AI, machine learning attacks, and how Cylance defends against them.
Video Interview · Ep. 27
Contrast Security — Stuart McClure Talks Company Culture
2019
In-depth interview as Cylance CEO on AI-driven prevention and the future of endpoint security.
Video Personal Profile
Matt Stephenson Interview: Stuart McClure on Suffering, Cycling and Wild Dogs
2019
A personal profile exploring the human side of Stuart: his love of cycling, resilience, and life philosophy.
Video Interview · Company Culture
Stuart McClure Talks Company Culture
2019
Stuart discusses building great company culture and what it takes to lead high-performing teams.
Video Interview · Road Trip Nation
Road Trip Nation Interview: Cylance
2018
The Road Trip Nation interview exploring Stuart's career path and advice for young professionals.
Video Interview · CBS News
Davos 2017: How AI Can Prevent Attacks
2017
Stuart's early argument that AI is the only viable path to truly stopping cyberattacks.
Video Video Interview · CXOTalk
Cybersecurity and Machine Learning — CXOTalk
2017
Stuart explains how AI and ML transformed threat detection at Cylance.
Video Interview · PAGO Networks
PAGO Networks (Cylance Interview) — CEO Stuart McClure
2017
Korean interview with Stuart McClure on Cylance's AI-driven cybersecurity approach.
Video Interview · Disruption Mag
Cylance CEO on the Growth of Cyber Warfare — Disruption Magazine
2016
Stuart discusses how state-sponsored cyber warfare is escalating and what it means for enterprises.
Video Interview · Stiennon
Cylance's Stuart McClure Talks with Richard Stiennon
2015
Security analyst Richard Stiennon interviews Stuart on Cylance's technology and market approach.
Entrepreneur Interview
Entrepreneur Interview: Stuart McClure, Cylance
2015
Stuart discusses the entrepreneurial journey of building Cylance from zero to unicorn.
Video Interview · Gen15
Gen15: Are We Complacent About Network Security?
2015
Stuart challenges the security industry's complacency at the Gen15 event.
Video Interview · Cylance
Entrepreneur Interview — Stuart McClure, Cylance
2014
Stuart discusses Cylance's AI-driven approach to cybersecurity and his entrepreneurial journey building the company.
Video Interview · 2013
2013: Stuart McClure, Cyber Security Expert who is the CEO of Cylance, Inc
2013
An interview with Stuart McClure as the newly appointed CEO of Cylance, discussing his cybersecurity expertise and vision for AI-driven threat prevention.
Video Interview · Hacking Exposed · 2004
Hacking Exposed — Canada
Oct 2004
Stuart delivers a live Hacking Exposed presentation in Canada, demonstrating real-world attack techniques and security vulnerabilities.
Video TV · CNN · Feb 2000
CNN Newsstand — February 2000
Feb 2000
Stuart's CNN Newsstand appearance in February 2000, one of his earliest major media spots on network television.
Video TV · CNN Morning · Feb 2000
CNN Morning News — February 2000
Feb 2000
Stuart on CNN Morning News discussing early internet security threats at the dawn of the web era.
Video TV · CNNfn · Mar 2000
CNNfn Business Unusual — March 2000
Mar 2000
Stuart's appearance on CNNfn's Business Unusual discussing cybersecurity as a business issue.

Investments

6 investments

Acquired

Keynotes & Conference Talks

27 appearances
Video Keynote · Converge! · Sep 2016
Converge! Network Digest — Cylance: AI and Cybersecurity
Sep 28, 2016
Stuart discusses Cylance's AI-driven approach to cybersecurity at the Converge! Network Digest event.
Video Keynote · Dec 2023
Incubating the Future: Solving Global Challenges with Predictive AI
Dec 4, 2023
Stuart presents NumberOne AI's vision for using predictive AI to solve global challenges.
Video Keynote · Oct 2018
Is Prevention Possible?
Oct 12, 2018
Stuart makes the case that prevention — not detection — is the only viable path forward in cybersecurity.
Video Keynote · RSA Conference · Apr 2017
RSA 2017: Captain Unhook: How to Bypass Everything... Literally
Feb 21, 2017
Stuart demonstrates how to bypass virtually every security control in a live RSA Conference presentation.
Video Keynote · AI User Conference · Mar 2024
AI User Conference — Qwiet AI
Mar 11, 2024
Stuart presents at the AI User Conference on Qwiet AI's approach to AI-powered application security.
Keynote · USENIX LISA · Dec 2001
LISA 2001: Hacking Exposed: LIVE
Dec 2, 2001
Stuart delivers a live Hacking Exposed tutorial at the USENIX LISA 2001 conference in San Diego.
Keynote · USENIX LISA · Jun 2001
Hacking Exposed: LIVE
Jun 25, 2001
Stuart delivers a live Hacking Exposed tutorial at the USENIX LISA 2001 conference.
Video Keynote · Wethos AI · 2024
Wethos AI Presentation
Oct 10, 2024
Stuart presents the Wethos AI vision for understanding and optimizing human potential and team dynamics through AI.
Video Keynote · RSA 2023
RSA 2023: Hacking Sec into DevOps
Jun 7, 2023
Stuart presents at RSA Conference 2023 on integrating security into DevOps workflows to shift left and prevent vulnerabilities before they ship.
Video Keynote · IMPACT 23 · 2023
IMPACT 23 Keynote: What Matters Most To Me? Prevention
Dec 3, 2023
Stuart delivers his IMPACT 23 keynote on why prevention — not detection — is the only viable philosophy in modern cybersecurity.
Video Keynote · AI User Group · 2023
AI-Powered AppSec With Qwiet AI
2023
Stuart presents AI-powered application security with Qwiet AI at the AI User Group.
Video Keynote · 2020
UCI Merage School of Business Commencement Address
May 10, 2020
Stuart delivers the commencement address to the graduating class of the UCI Paul Merage School of Business.
Video Keynote · RSA 2018
RSA 2018: Hacking Exposed NextGen & AI Defense Strategies
Jul 6, 2018
Stuart presents next-generation hacking strategies and AI-based defenses at RSAC 2018.
Video Keynote · CeBIT 2017
CeBIT 2017: Cylance on AI in Cybersecurity
Mar 29, 2017
Stuart presents Cylance's AI approach at Europe's largest tech conference.
Video Keynote · 2017
NTH Symposium 2017 Keynote
Dec 15, 2017
Stuart keynotes the NTH security symposium on AI-driven cybersecurity strategies.
Video Keynote · RSA 2017
RSA 2017: Next Generation Embedded and Voting Machine Hacking
Feb 21, 2017
Stuart demonstrates live next-generation embedded system and voting machine hacking techniques at RSA Conference 2017.
Video Keynote · 2016
2016 Edison Awards: AI — The Future of Security
Aug 25, 2016
Stuart presents on how AI will transform the security industry at the Edison Awards ceremony.
Video Keynote · RSA 2016
RSA 2016: Attacking in the Shadows
Mar 30, 2016
Stuart explores sophisticated attack techniques that operate in the shadows of enterprise networks at RSA Conference 2016.
Video Keynote · 2016
Artificial Intelligence, A.K.A. The Future of Everything
Jan 10, 2018
A sweeping keynote on how AI will reshape every industry, not just security.
Video Keynote · NetEvents · Sep 2016
NetEvents — Keynote Highlights: Kathryn Hume, Stuart McClure and Paul Jackson
Dec 13, 2016
Keynote highlights from NetEvents featuring Stuart McClure alongside Kathryn Hume and Paul Jackson.
Video Keynote · RSA 2015
RSA 2015: Next Generation Attacks
May 19, 2015
Stuart presents on the evolution of next-generation attack techniques at RSA Conference 2015.
Video Keynote · 2014
2014 AT&T Cybersecurity Conference Keynote
Jan 28, 2015
Stuart keynotes AT&T's major cybersecurity conference on AI-based threat prevention.
Video Panel · CEO · 2014
CEO Panel: The Entrepreneur Journey to Scale
Jun 10, 2014
Stuart joins a CEO panel discussion on the entrepreneurial journey, scaling companies, and lessons learned building from startup to enterprise.
Video Keynote · RSA 2013
RSA 2013: Embedded Hacking
Jun 3, 2013
Stuart demonstrates live embedded system hacking techniques at RSA Conference 2013.
Video Keynote · Cylance · 2013
Hacking Exposed: The Art of Deterrence
May 5, 2014
Stuart demonstrates advanced hacking techniques and introduces a new defense approach that stops 99% of endpoint-focused attacks.
Video Keynote · RSA 2012
RSA Conference 2012 Keynote: Securing the Unsecurable
2012
Stuart's landmark RSA 2012 keynote arguing that traditional security is fundamentally broken.
Video Keynote · RSA 2011
RSA 2011: Hacking Exposed — Exploiting the Cloud and Virtual Machines
Sep 7, 2011
Stuart and fellow Hacking Exposed authors demonstrate real-world exploits targeting cloud infrastructure and virtual machine environments at RSA Conference 2011.

News & Press Articles

31 articles
Press · OCBJ · Dec 2024
OC Insider: Spectrum Sales — OCBJ
Dec 8, 2024
Stuart mentioned in OCBJ's OC Insider column covering notable Orange County business developments.
Press · OCBJ · Aug 2024
OC's McClure Sees Long Road for CrowdStrike — OCBJ
Aug 5, 2024
Stuart provides expert commentary on CrowdStrike's challenges and the broader cybersecurity landscape.
Press · OCBJ · Jun 2024
Cylance Co-Founder McClure Launches New AI Startup — OCBJ
Jun 17, 2024
OCBJ coverage of Stuart's launch of Wethos AI, applying artificial intelligence to human potential.
Press · OCBJ · Oct 2022
Cylance's McClure Lands $13M for New AI Venture — OCBJ
Oct 25, 2022
OCBJ coverage of Stuart raising $13 million for NumberOne AI, his AI venture studio.
Press · OCBJ · Jun 2019
OCBJ Insider — OCBJ
Jun 23, 2019
Stuart featured in OCBJ's insider column covering Orange County business leaders.
Press · OCBJ · May 2019
OC 50 Keeping You Safe — OCBJ
May 5, 2019
Stuart named to OCBJ's OC 50 list for his role in keeping the world safe through AI cybersecurity.
Press · OCBJ · Nov 2018
BlackBerry's $1.4B Bet on Cylance Security — OCBJ
Nov 19, 2018
OCBJ coverage of BlackBerry's $1.4 billion acquisition of Cylance.
Press · OCBJ · Aug 2018
Software Companies Again Boost Headcount Over 5% — OCBJ
Aug 26, 2018
OCBJ special report on OC software companies' hiring growth, featuring Cylance among top performers.
Press · OCBJ · Jul 2017
Cylance Taps New Market — OCBJ
Jul 9, 2017
OCBJ reporting on Cylance's expansion into new market segments.
Press · OCBJ · Apr 2017
Cylance Cuts Jobs — OCBJ
Apr 6, 2017
OCBJ reporting on a round of job reductions at Cylance during strategic restructuring.
Press · OCBJ · Oct 2016
Cylance of the Worms — OCBJ
Oct 2, 2016
OCBJ feature on Cylance's approach to combating worm-based cyber threats with AI.
Press · OCBJ · Oct 2016
Software Maker Joins Data-Breach Resistance Group — OCBJ
Oct 2, 2016
OCBJ coverage of Cylance joining an industry coalition focused on combating data breaches.
Press · OCBJ · Sep 2016
Burgeoning Cybersecurity Lifts Cylance Nearly 2,000% — OCBJ
Sep 18, 2016
OCBJ special report on Cylance's explosive growth with revenue increasing nearly 2,000%.
Press · OCBJ · Jul 2016
Next Act for Cylance: Consumer Market — OCBJ
Jul 17, 2016
OCBJ coverage of Cylance's strategic move to bring AI-driven cybersecurity to consumers.
Press · OCBJ · Jul 2015
Cylance Gets $42M — OCBJ
Jul 28, 2015
OCBJ reporting on Cylance's $42 million funding round.
Press · VentureBeat · Dec 2012
How a Deadly Plane Flight Created Security Startup Cylance — VentureBeat
Dec 4, 2012
VentureBeat's early coverage tracing Cylance's origin to Stuart's experience on United Flight 811.
Press · OCBJ · May 2024
Cyber Pioneer Claims Cure for Cyberattacks — OCBJ
May 13, 2024
Deep dive into Cylance's AI-first approach to stopping attacks before execution.
Press · OCBJ · Oct 2023
Cylance Co-Founder McClure Steps Up AI Focus — OCBJ
Oct 16, 2023
Coverage of Stuart's pivot post-Cylance into Qwiet AI, Wethos AI, and NumberOne AI.
Press · Qwiet AI · Feb 2023
Let's Make Some Noise for Qwiet AI
Feb 15, 2023
Stuart announces and celebrates the Qwiet AI brand and mission.
Press · PR Newswire · Oct 2022
NumberOne AI Launches with Mission to Change the Incubator Game
Oct 11, 2022
Announcement and coverage of Stuart's launch of NumberOne AI.
Press · OCBJ · Aug 2022
Stuart McClure Shifts Ahead in Cybersecurity — OCBJ
Aug 23, 2022
Profile of his transition from BlackBerry Cylance to new AI ventures.
Press · SecurityWeek · 2019
Cylance Founder Stuart McClure Leaves BlackBerry — SecurityWeek
Sep 26, 2019
Reporting on Stuart's departure after the Cylance integration was complete.
Press · OC Register · Feb 2019
Cylance Bought by BlackBerry for $1.4 Billion — OC Register
Feb 22, 2019
News coverage of the landmark $1.5B acquisition by BlackBerry.
Press · Fintech Futures · Feb 2019
BlackBerry Buys AI Cybersecurity Firm Cylance for $1.4bn — Fintech Futures
Feb 25, 2019
Industry analysis of the BlackBerry-Cylance deal.
Investor Profile · DFJ · Mar 2018
Stuart McClure, Cylance — DFJ Venture Capital
Mar 29, 2018
Investor perspective from DFJ Growth, one of Cylance's backers.
Press · Inc. · Nov 2016
Meet the $1 Billion Startup Busting Cybersecurity's Greatest Myth — Inc.
Nov 30, 2016
Inc.'s landmark profile of Cylance as it approached unicorn status, challenging AV industry myths.
Press · Forbes · Jul 2016
Duelling Unicorns: CrowdStrike vs Cylance in Brutal Battle — Forbes
Jul 6, 2016
The epic competitive battle between two AI-powered security unicorns told through industry reporting.
Press · OC Register · Mar 2016
Airline Disaster Gave McClure the Genesis for Cylance — OC Register
Mar 17, 2016
The remarkable origin story: how United Airlines Flight 811 inspired Stuart's AI security vision.
News · Cylance · Jan 2013
Cylance Acquires Spearpoint
Jan 17, 2013
Stuart announces Cylance's acquisition of SpearPoint to enhance its services and research capabilities.
Press · OCBJ Archive
Stuart McClure — OCBJ Full Archive
Dec 10, 2019
All Orange County Business Journal coverage of Stuart McClure.
Encyclopedia · Wikipedia
Cylance — Wikipedia
Jul 15, 2012
Encyclopedia entry on Cylance, its technology, and acquisition by BlackBerry.

Patents

9 patents
Patent · Network Security · Foundstone 2002
Patent: System and Method for Network Vulnerability Detection and Reporting
Dec 19, 2006
Patent No.: US 7,152,105 B2
Stuart's foundational 2002 patent from Foundstone — the original framework for automated network vulnerability scanning, OS fingerprinting, and quantitative security scoring. First US grant 2006 (US7152105B2); five US continuations granted through 2013. Later assigned to McAfee following acquisition.
Patent · ML Classification · Active
Patent: Automated Systems for Generative Multimodel Multiclass Classification Using Machine Learning
May 23, 2023
Patent No.: US 11,657,317 B2
Cylance's core AI patent covering automated ML-based multiclass classification of software artifacts for malware detection. Originally filed 2014; granted as US11657317B2 in May 2023 — active through October 2037. Co-invented with Ryan Permeh, Matthew Wolff, and the Cylance research team.
Patent · Network Security · McAfee 2012
Patent: Network Vulnerability Detection and Reporting (Continuation II)
Mar 13, 2012
Patent No.: US 8,135,830 B2
Second major US grant (2012) in the Foundstone/McAfee network vulnerability family. Adds TCP fingerprinting, parallel batch port scanning (640 simultaneous slots), and intelligent UDP scanning with latency detection.
Patent · Network Security · McAfee 2013
Patent: Network Vulnerability Detection and Reporting (Continuation III)
Dec 24, 2013
Patent No.: US 8,615,582 B2
Third US grant (Dec 2013) covering the hierarchical graphical reporting methodology for network vulnerability results — dynamic network topology visualizations over text-based reports.
Patent · Network Security · McAfee 2013
Patent: Network Vulnerability Detection and Reporting (Continuation IV)
Dec 31, 2013
Patent No.: US 8,621,060 B2
Fourth US grant (Dec 2013) covering multi-tier port scanning and vulnerability database comparison methodology within the automated network security assessment framework.
Patent · Network Security · McAfee 2013
Patent: Network Vulnerability Detection and Reporting (Continuation V)
Dec 31, 2013
Patent No.: US 8,621,073 B2
Fifth US grant (Dec 2013) covering active vulnerability assessment and quantitative security scoring components of the automated network vulnerability detection system.
Patent · Ensemble ML · Active 2019
Patent: Application Execution Control Utilizing Ensemble Machine Learning (US Grant)
Mar 19, 2019
Patent No.: US 10,235,518 B2
Granted US patent (March 2019, active through Feb 2035) for Cylance's core AI security technology — real-time execution control using ensemble ML analyzing static and dynamic features to prevent malicious execution.
Patent · Ensemble ML · Active 2020
Patent: Application Execution Control Utilizing Ensemble Machine Learning (Continuation)
Oct 27, 2020
Patent No.: US 10,817,599 B2
Continuation grant (Oct 2020, active through Feb 2035) broadening claims to cover receiving features from operational, static, dynamic, and external sources to generate safety scores with confidence levels.
Patent · Network Scoring · Active
Patent: System and Method for Network-Based Asset Operational Dependence Scoring
Mar 31, 2015
Patent No.: US 8,997,234 B2
McAfee patent (granted 2015, active through July 2031) that calculates operational dependence scores for network assets by analyzing services, connections, and data criticality to prioritize vulnerability remediation.

Philanthropy

4 initiatives

Podcasts

22 episodes
Podcast · CyberScoop · Feb 2016
CyberScoop Radio: Cyberthreats to Critical Infrastructure
Feb 10, 2016
Stuart discusses Cylance's perspective on cyberthreats facing critical infrastructure on CyberScoop Radio.
Podcast · Qwiet AI · Jun 2023
Hacking Exposed Podcast, Qwiet Edition — Episode 1: MOVEit Vulnerability Analysis
Jun 1, 2023
Stuart hosts the premiere episode analyzing the MOVEit vulnerability and its implications for application security.
Podcast · Qwiet AI · Jul 2023
Hacking Exposed, Qwiet Edition — Episode 1, Part 2
Jul 6, 2023
Continuation of the MOVEit vulnerability deep dive with technical analysis and remediation strategies.
Podcast · Qwiet AI · Jul 2023
Hacking Exposed, Qwiet Edition — Episode 2
Jul 23, 2023
Stuart hosts the second episode of the Hacking Exposed Qwiet Edition podcast series.
Podcast · Qwiet AI · Aug 2023
Hacking Exposed, Qwiet Edition — Episode 3
Aug 11, 2023
Episode 3 of the Hacking Exposed Qwiet Edition podcast series.
Podcast · Qwiet AI · Sep 2023
Hacking Exposed, Qwiet Edition — Episode 4
Sep 9, 2023
Episode 4 of the Hacking Exposed Qwiet Edition podcast series.
Podcast · Qwiet AI · Oct 2023
Hacking Exposed, Qwiet Edition — Episode 5
Oct 18, 2023
Episode 5 of the Hacking Exposed Qwiet Edition podcast series.
Podcast · Qwiet AI · Oct 2023
Hacking Exposed, Qwiet Edition — Episode 6
Oct 28, 2023
Episode 6 of the Hacking Exposed Qwiet Edition podcast series.
Podcast · Qwiet AI · Nov 2023
Hacking Exposed, Qwiet Edition — Episode 7: Predator Spyware Deep Dive
Nov 3, 2023
Stuart hosts a deep dive into the Predator spyware threat and its implications for mobile security.
Podcast · Qwiet AI · Dec 2023
Hacking Exposed, Qwiet Edition — Episode 8: Sam Altman/OpenAI Analysis
Dec 1, 2023
Stuart analyzes the Sam Altman/OpenAI leadership crisis and its implications for AI governance.
Podcast · The Trust Revolution · Jan 2021
Supply Chain Hacking Breaks Cyber Trust — The Trust Revolution
Jan 19, 2021
Stuart explains how SolarWinds-style supply chain attacks exploit misplaced trust, and why AI-based prevention beats signature-based detection.
Video Podcast · Distilling Philanthropy · Mar 2026
What False Consensus is Doing to Your Giving Strategy — Distilling Philanthropy · 55 min
Mar 15, 2026
Stuart discusses how false consensus bias undermines philanthropy, applying prevention thinking from cybersecurity to charitable giving strategy.
Podcast · Cyber Confessions · Mar 2026
Why Your Phone is NEVER Truly Off — Cyber Confessions with Caitlin Sarian · 21 min
Mar 11, 2026
Stuart joins Cybersecurity Girl to discuss how smartphones remain active when powered down, medical device hacking risks, and practical privacy and home network security strategies.
Video Podcast · Wethos AI · 2025
Wethos AI CEO on Predictable Hiring: How to Quantify Traits and Biases for Success · 1 min 30 sec
Jul 11, 2024
Stuart explores how Wethos AI quantifies cognitive traits and biases to make hiring more predictable and successful.
Video Podcast · Wethos AI · 2025
Wethos AI CEO on Cognitive Biases and the Future of Work · 1 min 13 sec
Jul 11, 2024
Stuart discusses cognitive biases, the future of work, and how Wethos AI is using artificial intelligence to understand and optimize human potential.
Podcast · GoSec · 2024
Bare Knuckles and Brass Tacks — How to Scale Success in Cyber (GoSec 2024) · 33 min
Sep 23, 2024
Stuart shares lessons from scaling Cylance and building serial cybersecurity ventures at GoSec 2024.
Video Podcast · ASW #291 · 2024
Application Security Weekly ASW #291 — Producing Secure Code with AI · 33 min
Jul 16, 2024
Stuart explains how combining LLMs, agents, and RAGs makes AI tools effective for writing secure code.
Video Podcast · S1E5 · 2024
Product Leaders Journey S1E5 — AI for High Performing Teams · 46 min
Jan 25, 2024
Stuart on using AI to build high-performing teams and the 'Ethos of We.'
Podcast · Qwiet AI · Mar 2024
Qwiet AI: The Intersection of AI and Application Security · 24 min
Mar 6, 2024
Stuart discusses how Qwiet AI applies artificial intelligence to transform application security testing and vulnerability detection.
Podcast · Business of Cyber · 2023
Business of Cyber Podcast — Preventing the Unpreventable · 33 min
Feb 15, 2023
Stuart with Joe Vinck on founding companies and stopping cyber threats.
Podcast · InnovationAus · Apr 2019
InnovationAus Podcast — Founder & CEO, Cylance · 25 min
Apr 15, 2019
Stuart discusses selling Foundstone to McAfee, building Cylance, and the $1.5B BlackBerry sale.
Podcast · Risky Business · May 2017
Risky Business #455 — What a Mess: WannaCry · 63 min
May 17, 2017
Stuart joins Patrick Gray on Risky Business to discuss the WannaCry ransomware outbreak and its implications for cybersecurity.

Testimony

4 reports

United Flight 811

15 items
Article · Medium · Jan 2023
Violent Night: The Near Crash of United Airlines Flight 811
Jan 14, 2023
Admiral Cloudberg's detailed investigation and analysis of the United Airlines Flight 811 disaster.
Reddit · r/CatastrophicFailure
Reddit: r/CatastrophicFailure — UAL 811
2023
Reddit community discussion on the near crash of United Airlines Flight 811 and the catastrophic cargo door failure.
NTSB Report · Mar 1992
NTSB: Aircraft Accident Report
Mar 18, 1992
The official NTSB Aircraft Accident Report for United Airlines Flight 811, detailing the cargo door failure investigation and findings.
Flight 811 · CVR · Feb 1989
United 811 Cockpit Voice Recorder (CVR)
Feb 24, 1989
Cockpit voice recorder transcript and analysis from United Airlines Flight 811 on February 24, 1989.
Video Video · Feb 1989
United Flight 811 Emergency (1989)
Feb 25, 1989
News footage and documentary coverage of the United Airlines Flight 811 emergency on February 24, 1989.
Article · Confessions of a Trolley Dolly · Feb 2026
United Airlines Flight 811 — Confessions of a Trolley Dolly
Feb 24, 2026
A flight attendant's perspective on the United Airlines Flight 811 disaster and its lasting impact on aviation safety.
Article · Airscape Magazine · Feb 2017
UAL 811: The Untold Story — Airscape Magazine
Feb 8, 2017
Airscape Magazine's in-depth account of the United Airlines Flight 811 disaster and the investigation that uncovered the truth behind the cargo door failure.
Article · New York Magazine
Al Slader Interview — New York Magazine
2009
New York Magazine interview with Al Slader, a fellow survivor of United Airlines Flight 811.
Press · Stuff.co.nz · Apr 2018
From the Archives: Flight 811 — The Untold Story
Apr 17, 2018
Stuff.co.nz's in-depth archival feature on the United Flight 811 disaster and the investigation that followed.
Press · Stuff.co.nz · Oct 2019
United Airlines Flight 811 Survivor Writing Book to Honour Victims Including Kiwi
Oct 19, 2019
Stuart's story as a Flight 811 survivor and his mission to honour the victims through a book, including New Zealand passenger Lee Campbell.
Aviation History · 1989
This Day in Aviation: February 24, 1989 — United Airlines Flight 811
Feb 24, 1989
The full account of what happened on February 24, 1989 when United Airlines Flight 811 suffered explosive decompression after takeoff from Honolulu.
Video Video · Green Dot Aviation
Documentary - HOW did this plane FALL APART after takeoff! United 811
Oct 16, 2024
Green Dot Aviation's deep dive into how United Flight 811 fell apart after takeoff and the investigation that followed.
Press · OC Register 2016
Airline Disaster Gave McClure the Genesis for Cylance — OC Register
Mar 17, 2016
The remarkable origin story: how United Airlines Flight 811 inspired Stuart's AI security vision.
Video Video · Smithsonian Channel
Air Disasters: Terror Over the Pacific
Apr 5, 2025
Smithsonian Channel's Aviation Nation episode covering the United Flight 811 disaster featuring Stuart McClure.
Video Video · Mayday ACI
Mayday ACI: Terror Over the Pacific (United 811)
Jan 1, 2026
Full Mayday Air Crash Investigation episode featuring Stuart McClure and the United Flight 811 disaster.

Webinars

14 episodes
Video Webinar · RSA 2017
RSA 2017: Next Generation — Quick Look
Feb 7, 2017
Stuart offers a rapid-fire look at next-generation attack techniques and defenses at RSA Conference 2017.
Video Webinar · FCON · Oct 2024
FCON: Intersection of AI & Cybersecurity
Oct 16, 2024
Stuart's keynote exploring where artificial intelligence and cybersecurity converge.
Video Webinar · 2019
Hacking Exposed: Live
Aug 5, 2019
Stuart delivers a live Hacking Exposed demonstration showcasing real-world attack techniques and defenses.
Video Webinar · Operation Cleaver · Dec 2014
Operation Cleaver
Dec 16, 2014
Stuart presents Cylance's Operation Cleaver findings, exposing Iranian state-sponsored hackers infiltrating critical infrastructure worldwide.
Video Webinar · Hacking Exposed · May 2013
Hacking Exposed: LIVE — #035 — Why Current Security Solutions Fail
May 29, 2013
Stuart demonstrates why traditional signature-based security solutions are fundamentally broken and how AI-driven prevention is the future.
Video Webinar · AI Exposed
AI Exposed: The Hype Must Die! — Part I: The Simple Truth · 58 min
Jan 23, 2025
The opening salvo of Stuart's viral AI Exposed manifesto series.
Video Webinar · AI Exposed
AI Exposed: The Hype Must Die! — Part II: The Hard Truth · 1 hr
Mar 14, 2025
Stuart continues his AI Hype Must Die series with deeper analysis of AI's real-world limitations.
Video Webinar · AI Exposed
AI Exposed: The Hype Must Die! — Part III: The Hardest Truth · 1 hr
May 12, 2025
Part III of the AI Exposed series pushing further into uncomfortable truths about AI's limitations.
Video Webinar · AI Exposed
AI Exposed: The Hype Must Die! — Part IV: The Inconvenient Truth · 58 min
Dec 18, 2025
The final part of Stuart's 4-part AI Exposed series confronting hard realities about artificial intelligence.
Video Webinar · 2025
Human + AI > AI: Reimagining Talent, Work and Hypergrowth · 45 min
Jun 13, 2025
Stuart's thesis that human-AI collaboration beats pure AI.
Video Webinar · 2025
Coach at Scale: Know and Grow Every Employee with Artificial Individual Intelligence · 29 min
Aug 29, 2025
How AI can provide personalized coaching to every employee at enterprise scale.
Video Webinar · 2024
AI, Take My Job. Please.
Aug 18, 2024
Stuart's counterintuitive argument for embracing AI automation of human work.
Video Webinar · 2024
Lead the Future: How AI is Revolutionizing Team Dynamics and Success · 1 hr
Oct 25, 2024
Leadership insights on building AI-augmented teams.
Video Webinar · GSM Hacking · 2012
Hacking Exposed: Live — 2012 — GSM Hacking · 48 min
May 31, 2012
A live Hacking Exposed demonstration from 2012 showing GSM network vulnerabilities and real-world cellular attack techniques.
Goodreads Qwiet AI BlackBerry Blog The Org DFJ Growth InformIT

Frequently Asked Questions

Stuart McClure is a cybersecurity pioneer and serial AI entrepreneur with over 35 years of experience. He is best known as the co-founder and CEO of Cylance, which was acquired by BlackBerry for $1.5 billion in 2019, and as the founding and leading author of Hacking Exposed, the #1 selling cybersecurity book of all time. He has founded or led seven companies, holds 9 patents, and currently leads Wethos AI (AI for human potential) and NumberOne AI (AI incubator/accelerator).
Cylance was the first cybersecurity company to apply artificial intelligence and machine learning to endpoint protection, fundamentally changing how the industry approached threat prevention. Co-founded by Stuart McClure in 2012, it became the fastest company in cybersecurity history to reach $100M in annual recurring revenue (in just 3.25 years) and was acquired by BlackBerry for $1.5 billion in February 2019.
Hacking Exposed: Network Security Secrets & Solutions is the #1 bestselling cybersecurity book of all time, first published in 1999. Stuart McClure is the founding and lead author across seven editions (1999–2012). The book revolutionized the security industry by cataloging real-world attack techniques and defenses. Stuart authored or co-authored 12 books total: 8 founding Hacking Exposed editions (seven network security editions plus Web Hacking: Attacks & Defense), 3 co-authored editions (Hacking Exposed: Windows 1st–3rd), and Hacking for Dummies (foreword contribution elevated to co-author credit).
Stuart has founded or led seven companies: Computerese (founder 1992–1994, IT/networking and custom software), Foundstone (co-founder 1999–2004, acquired by McAfee), McAfee (Global CTO 2004–2012), Cylance (co-founder/CEO 2012–2019, $1.5B exit to BlackBerry), NumberOne AI (current, AI incubator), Qwiet AI (CEO 2022–2025, acquired by Harness), and Wethos AI (current, AI for human potential). Including board and advisory positions, Stuart has been involved in nine successful exits — from Foundstone→McAfee and Cylance→BlackBerry to Demisto→Palo Alto Networks ($560M), MightyID→Semperis, CyberGRX→ProcessUnity, JASK→Sumo Logic, Digital Shadows→ReliaQuest, Qwiet AI→Harness, and McAfee→Intel ($7.8B).
You can reach Stuart through the Inquire button at the top of this page, which sends a direct message to his team. For speaking engagements, you can also contact him through All American Speakers or connect directly via LinkedIn. Additionally you can hit the Inquire button at the top of this page to send an email directly to Stuart.
On February 24, 1989, United Airlines Flight 811 suffered an explosive cargo door failure over the Pacific Ocean, killing 9 passengers. Stuart McClure was aboard that flight as a teenager. The experience of surviving a catastrophic systems failure — one that could have been prevented — became the defining origin story of his career. It instilled a deep conviction that prevention must come before reaction, a philosophy he carried into cybersecurity with Cylance and every company since. The incident was featured in National Geographic's Air Crash Investigation series.
System 3 Thinking is Stuart McClure's framework for understanding the next era of human cognition. Building on Daniel Kahneman's System 1 (fast, intuitive) and System 2 (slow, analytical) thinking, Stuart proposes System 3 as the integration of artificial intelligence with human reasoning — creating a new cognitive layer where humans and AI collaborate to achieve outcomes neither could reach alone. It is the conceptual foundation behind Wethos AI and the subtitle of this site.
From 1997 to 2003, Stuart McClure wrote the "Security Watch" column for InfoWorld, one of the most influential technology publications of its era. Spanning 132 columns, it was one of the first regular cybersecurity columns in mainstream tech media. Stuart covered everything from emerging hacking techniques and firewall reviews to policy debates around full disclosure and encryption — building the readership and credibility that helped launch Hacking Exposed and Foundstone. The full archive is preserved on this site.