Industry News

digitronic® computersysteme GmbH, Germany named winner in the 14th Annual Info Security PG’s 2018 Global Excellence Awards®

San Francisco, Chemnitz, 03/07/2018: digitronic® announced today that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named the All-In-One Compliance Package a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in General Data Protection (GDPR) Solutions. These prestigious global awards recognize cybersecurity and information technology […]

Featured Thought Leader

Information Security Policy: The Benefit of Being Threat-Agnostic

I recently spoke with Rene Kolga of Nyotron about ways that organizations can improve their information security policy. Rene, who’s been working in enterprise software for over 20 years, offered a number of insights into the value of taking a threat-agnostic approach to protecting information assets. Rene Kolga:                        Nyotron has an endpoint security product that, […]

Featured Thought Leader

Information Security Policy: The Benefit of Being Threat-Agnostic

I recently spoke with Rene Kolga of Nyotron about ways that organizations can improve their information security policy. Rene, who’s been working in enterprise software for over 20 years, offered a number of insights into the value of taking a threat-agnostic approach to protecting information assets. Rene Kolga:                        Nyotron has an endpoint security product that, […]

Featured Thought Leader

Understanding Multi-Layered Cyber Security Threats: A Conversation with Robert Huber

Establishing cyber policy requires understanding how cyberattacks can take shape in multiple layers of an organization. A data breach can be more than a data breach if the data is used to create social profiles of targeted individuals—with that information then further enhanced by deep penetration of networks and devices. Robert Huber, who has spent […]

Featured Thought Leader

Understanding Multi-Layered Cyber Security Threats: A Conversation with Robert Huber

Establishing cyber policy requires understanding how cyberattacks can take shape in multiple layers of an organization. A data breach can be more than a data breach if the data is used to create social profiles of targeted individuals—with that information then further enhanced by deep penetration of networks and devices. Robert Huber, who has spent […]

Featured Thought Leader

Scanning Code for Malware: A Conversation with Robert Wood

Hugh Taylor:                       Tell us about yourself. Software is a big part of cyber policy. We really wanted to get a software perspective. Robert Wood:                    I’m the Chief Security Officer at a company called SourceClear and the founder of Hack Your Cyber Career. At SourceClear we are focused on software composition analysis, basically trying to figure out […]

Featured Thought Leader

Scanning Code for Malware: A Conversation with Robert Wood

Hugh Taylor:                       Tell us about yourself. Software is a big part of cyber policy. We really wanted to get a software perspective. Robert Wood:                    I’m the Chief Security Officer at a company called SourceClear and the founder of Hack Your Cyber Career. At SourceClear we are focused on software composition analysis, basically trying to figure out […]

Thought Leader

Using Machine Learning to Secure Networks: A Conversation with Kris Lovejoy

Hugh Taylor:                       Why don’t you tell me a little about yourself, your background in security, and in the company? Kris Lovejoy:                      I have been in the security field since pretty much the beginning. I started out as a network engineer and was brought up on security principles within that context. I was an ethical hacker […]

Thought Leader

Using Machine Learning to Secure Networks: A Conversation with Kris Lovejoy

Hugh Taylor:                       Why don’t you tell me a little about yourself, your background in security, and in the company? Kris Lovejoy:                      I have been in the security field since pretty much the beginning. I started out as a network engineer and was brought up on security principles within that context. I was an ethical hacker […]

Thought Leader

Securing Critical Infrastructure: A Conversation with David Dingwall

Hugh Taylor:                       Tell us a little bit about yourself and your background and how you came to be doing this kind of work. David Dingwall:                 I was quite lucky to be a student in a university where Unix was used on my degree course, the very, very early days of Berkeley Unix where it was […]

Thought Leader

Securing Virtual Networks: A Conversation with Dwight Koop

Hugh Taylor:                       Tell me a little bit about your background and the company you work for now. Dwight Koop:                     I’m definitely a senior citizen and have been around for a while. Now, I am Chief Financial Officer of Cohesive Networks. We’re a software company that builds, in the simplest sense, firewalls, routers, switches—virtual appliances that […]

Thought Leader

Securing Critical Infrastructure: A Conversation with David Dingwall

Hugh Taylor:                       Tell us a little bit about yourself and your background and how you came to be doing this kind of work. David Dingwall:                 I was quite lucky to be a student in a university where Unix was used on my degree course, the very, very early days of Berkeley Unix where it was […]

Thought Leader

Securing Virtual Networks: A Conversation with Dwight Koop

Hugh Taylor:                       Tell me a little bit about your background and the company you work for now. Dwight Koop:                     I’m definitely a senior citizen and have been around for a while. Now, I am Chief Financial Officer of Cohesive Networks. We’re a software company that builds, in the simplest sense, firewalls, routers, switches—virtual appliances that […]