Author Description

Gary M

Author Posts

Making Cybersecurity Risk Measurable – The Future is Here!

2nd Annual FAIR Breakfast at National Harbor – June 18, 2019 Join us in National Harbor on…

How Security Automation Mixed with an IT Culture Shift can Prevent Data Leakage from Misconfigured Servers

by Chris DeRamus, CTO, DivvyCloud In 2018, misconfigured AWS S3 servers accounted for multiple data breaches across…

Introducing Insider Threat Training – So Critically Important

We’re Thrilled to Share This Exclusive Offer from The Insider Threat Defense Group Whether purposeful or accidental,…

USB-Lock-RP Review: Central Control of Device Access to Computers

It’s time to harden your entire network of Windows laptops, desktops and servers.  Here’s how… This review…

Phoebe the Phisher: Will this Cyber-villain Ever be Captured?

While researching for this article about Gary Berman’s wildly popular comic series, The CyberHero Adventures: Defenders of…

Security Product Spotlight: Aegis Fortress L3

I was invited by Apricorn to test their Aegis Fortress L3 – USB 3.1 / 3.2 Portable…

Digital Transformation Speaker Series Coming to New Hampshire

Will you be in the New Hampshire area on May 2, 2019? You’re Invited Join us for…

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System by Richard Blech, CEO, Secure Channels Inc. ENCRYPTION IS A MUST DEPLOY…

Cyber Investing Summit Returns to NYC on May 16 2019

Explore the Financial Opportunities, Trends and Strategies in the Cybersecurity Sector Key decision makers, investors, and innovators…

Integris Software 2019 Data Privacy Maturity Study

As compliance related fines escalate, there is a growing amount of visibility and overconfidence among companies on…

Show Buttons
Hide Buttons