San Francisco, Chemnitz, 03/07/2018: digitronic® announced today that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named the All-In-One Compliance Package a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in General Data Protection (GDPR) Solutions. These prestigious global awards recognize cybersecurity and information technology […]
A few weeks ago, I spoke with Dave Venable of Masergy, a network company that now provides managed detection and response services, to get an industry viewpoint on national cyber security policy. Masergy’s perspective in general is that attacks are fairly pervasive. As Venable put it, “It was shown over the last several years that […]
I recently spoke with Rene Kolga of Nyotron about ways that organizations can improve their information security policy. Rene, who’s been working in enterprise software for over 20 years, offered a number of insights into the value of taking a threat-agnostic approach to protecting information assets. Rene Kolga: Nyotron has an endpoint security product that, […]
I recently spoke with Rene Kolga of Nyotron about ways that organizations can improve their information security policy. Rene, who’s been working in enterprise software for over 20 years, offered a number of insights into the value of taking a threat-agnostic approach to protecting information assets. Rene Kolga: Nyotron has an endpoint security product that, […]
Establishing cyber policy requires understanding how cyberattacks can take shape in multiple layers of an organization. A data breach can be more than a data breach if the data is used to create social profiles of targeted individuals—with that information then further enhanced by deep penetration of networks and devices. Robert Huber, who has spent […]
Establishing cyber policy requires understanding how cyberattacks can take shape in multiple layers of an organization. A data breach can be more than a data breach if the data is used to create social profiles of targeted individuals—with that information then further enhanced by deep penetration of networks and devices. Robert Huber, who has spent […]
Hugh Taylor: Tell us about yourself. Software is a big part of cyber policy. We really wanted to get a software perspective. Robert Wood: I’m the Chief Security Officer at a company called SourceClear and the founder of Hack Your Cyber Career. At SourceClear we are focused on software composition analysis, basically trying to figure out […]
Hugh Taylor: Tell us about yourself. Software is a big part of cyber policy. We really wanted to get a software perspective. Robert Wood: I’m the Chief Security Officer at a company called SourceClear and the founder of Hack Your Cyber Career. At SourceClear we are focused on software composition analysis, basically trying to figure out […]
Firmware is a cyberattack vector. While public attention focuses on cyberattacks and data breaches conducted over networks with software-borne malware, the risk of malicious code embedded in the firmware of millions of digital devices poses a potentially more serious threat to cybersecurity. This report reviews how security professionals view the firmware threat as well as […]
Firmware is a cyberattack vector. While public attention focuses on cyberattacks and data breaches conducted over networks with software-borne malware, the risk of malicious code embedded in the firmware of millions of digital devices poses a potentially more serious threat to cybersecurity. This report reviews how security professionals view the firmware threat as well as […]
Hugh Taylor: Why don’t you tell me a little about yourself, your background in security, and in the company? Kris Lovejoy: I have been in the security field since pretty much the beginning. I started out as a network engineer and was brought up on security principles within that context. I was an ethical hacker […]
Hugh Taylor: Why don’t you tell me a little about yourself, your background in security, and in the company? Kris Lovejoy: I have been in the security field since pretty much the beginning. I started out as a network engineer and was brought up on security principles within that context. I was an ethical hacker […]
Hugh Taylor: Tell us a little bit about yourself and your background and how you came to be doing this kind of work. David Dingwall: I was quite lucky to be a student in a university where Unix was used on my degree course, the very, very early days of Berkeley Unix where it was […]
Hugh Taylor: Tell me a little bit about your background and the company you work for now. Dwight Koop: I’m definitely a senior citizen and have been around for a while. Now, I am Chief Financial Officer of Cohesive Networks. We’re a software company that builds, in the simplest sense, firewalls, routers, switches—virtual appliances that […]
Hugh Taylor: Tell us a little bit about yourself and your background and how you came to be doing this kind of work. David Dingwall: I was quite lucky to be a student in a university where Unix was used on my degree course, the very, very early days of Berkeley Unix where it was […]
Hugh Taylor: Tell me a little bit about your background and the company you work for now. Dwight Koop: I’m definitely a senior citizen and have been around for a while. Now, I am Chief Financial Officer of Cohesive Networks. We’re a software company that builds, in the simplest sense, firewalls, routers, switches—virtual appliances that […]