fbpx

Cyber Security

By Christiaan Beek, Lead Scientist & Principal Engineer, Office of the CTO, McAfee LLC

Is the motivation behind a Denial of Service attack or ransomware attack always extortion?

Every week, numerous media outlets report that another company has been breached. We tend to accept it, shrug our shoulders and continue on. As...
Guy Caspi, CEO, Deep Instinct

Deep Instinct™: SAVING THE DAY THROUGH PREDICTION & PREVENTION

Deep Instinct has been known to be the first company to apply deep learning to cyber security. With a team that includes veterans of...
Steven Sprague, CEO & Cofounder

Rivetz: Away With User-based Security, In With Device-based Protection

Recent findings published by Cybersecurity Ventures, a firm that delivers cybersecurity market data and insights, indicate that in 2017, the global cybersecurity market is...
Debasish Pramanik, CEO & Co-Founder, CloudCodes

CloudCodes: BRINGING BACK THE PROVIDER – CUSTOMER RELATIONSHIP IN CLOUD SECURITY

CloudCodes was founded in the year 2011 with a lot of focus aimed at customer interaction and taking into consideration their feedback, in order...
Theresa Payton, CEO and Co-Founder, Fortalice

From the White House server room to your company’s front door – the CIO...

The success (or failure) of a company to protect digital data is a window into the soul of cybersecurity today. Why do bad things happen...
Bob Karschnia, VP/GM of Wireless, Emerson Automation Solutions

IIoT Wireless Cybersecurity

Most Industrial Internet of Things (IIoT) applications will utilize some type of wireless communication network for transmitting data collected by sensors to host systems....
Walter Paley, Director, Marketing , SafeLogic

HBO’s Silicon Valley Foreshadows Possible Federal Storyline

Recently, HBO’s hit series Silicon Valley made reference to the once-esoteric FIPS 140-2 validation process for encryption. In the show, the massive Hooli juggernaut...
John Brady, CISO, Secure-24

Vendor Management: It’s a Risky Business

Just like exercising and getting sufficient sleep, we often discuss managing our vendors, suppliers and partners better. However, industry surveys continue to show a...
John Parkinson, Affiliate Partner, Waterstone Management Group

A life of (cyber) crime

It seems as if cybercrime is in the mainstream media more and more often these days – and with good reason, if not an...
Barry Barlow, Senior VP & CTO, Vencore, Inc.

The emerging cyber landscape

By Barry Barlow, Senior VP & CTO, Vencore, Inc. “You've got to ask yourself one question. Do I feel lucky?” As the delineation between cybercrime and...

Digital Magazines