Tech manifestos are often cringe-worthy acts of presumption, a harangue, a screech of superior attitude by people who haven’t earned the right to tell everyone else what to do. So, it was with some alarm that I found myself considering a manifesto of my own. Having spent nearly two decades involved in cyber security, however, […]
Tech manifestos are often cringe-worthy acts of presumption, a harangue, a screech of superior attitude by people who haven’t earned the right to tell everyone else what to do. So, it was with some alarm that I found myself considering a manifesto of my own. Having spent nearly two decades involved in cyber security, however, […]
Stewart Kantor: I’m the CEO and co-founder of Full Spectrum. We manufacture and distribute licensed wireless communications equipment for mission critical industries, such as electric and water utilities, transportation, homeland security and any entity or application where security and network reliability are of paramount importance. We can provide either a secure wireless communication network as […]
Stewart Kantor: I’m the CEO and co-founder of Full Spectrum. We manufacture and distribute licensed wireless communications equipment for mission critical industries, such as electric and water utilities, transportation, homeland security and any entity or application where security and network reliability are of paramount importance. We can provide either a secure wireless communication network as […]
Would You Buy a Car with No Brakes? Me, neither. Yet, if we take a hard look at the many types and layers of digital technology that affect our lives, we might see how out of control we truly are. Take your average smart phone. It’s likely to be manufactured in a country the US […]
Would You Buy a Car with No Brakes? Me, neither. Yet, if we take a hard look at the many types and layers of digital technology that affect our lives, we might see how out of control we truly are. Take your average smart phone. It’s likely to be manufactured in a country the US […]
We would like to hear what you think about firmware-borne threats. Please take two minutes to complete the following survey. We will share the findings with you. One lucky respondent will receive a $100 Amazon gift card as well! You can fill it out right here:
We would like to hear what you think about firmware-borne threats. Please take two minutes to complete the following survey. We will share the findings with you. One lucky respondent will receive a $100 Amazon gift card as well! You can fill it out right here:
We talked to Scottie Cole and Troy Gill of AppRiver about ways to protect networks from email-borne attacks. The conversation is a useful starting point in understanding how policies and tools can come together to protect email and improve security posture. Hugh How did AppRiver come into existence? Troy/Scottie We launched in 2002, with […]
We talked to Scottie Cole and Troy Gill of AppRiver about ways to protect networks from email-borne attacks. The conversation is a useful starting point in understanding how policies and tools can come together to protect email and improve security posture. Hugh How did AppRiver come into existence? Troy/Scottie We launched in 2002, with […]
Jason McNew Founder and CEO of Stronghold Cyber Security, has over 20 years of experience in the field of Information Technology. This includes 12 years at the White House Communications Agency (WHCA) and Camp David, where he worked on some of the most secure systems in the world, for some of the most important customers […]
Jason McNew Founder and CEO of Stronghold Cyber Security, has over 20 years of experience in the field of Information Technology. This includes 12 years at the White House Communications Agency (WHCA) and Camp David, where he worked on some of the most secure systems in the world, for some of the most important customers […]
Hugh Taylor: Tell us about yourself. Steven Sprague: I’ve been at the forefront at the trusted computing space for almost my whole career. At Wave Systems, I was involved in building hardware security for entertainment and video game type content, actually building security chips that did micro-transaction and encryption and stored value and a whole […]
While it’s impossible to state with certainty that all electronics built in China or other foreign adversaries contain security threats, the risks are real. “We are under attack nearly every day,” said Captain Jeffrey Buss of the US Naval Academy’s Center for Cyber Security Studies. China and Russia are currently attacking the United States on […]