Author Description

Author Posts

Five Strategies to Optimize Cloud Security in 2019

By Dannie Combs, CISO at DFIN Article text as more companies move data to the cloud, cybersecurity…

Operational Excellence: The Key to Federal Agencies’ Compliance

By Stan Lowe, Global Chief Information Security Officer, Zscaler In many realms of life, there’s a difference…

What’s next for Cyber-security?

By Min Pyo Hong, CEO, and Founder, SEWORKS What just happened? Unfortunately, many organizations may find themselves…

Putting Security in Context

by Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows…

From HUMINT to Virtual HUMINT

The new frontier of Intelligence By Antonio Teti Professor of IT Governance and Big Data, University “G….

Overcoming the Cyber-security Staffing Drought

COMPANIES WON’T EVER BE ABLE TO HIRE ENOUGH QUALIFIED PROS. PARTNERING WITH FULL-SERVICE CYBERSECURITY PROVIDERS IS NOW…

The Purpose of Neural Networks in Cryptography

By Milica D. Djekic Through the entire history of the Human Kind, nature would keep surprising and…

The Challenges of Endpoint Security

By Milica D. Djekic The endpoint devices are those gadgets that would be the part of a…

How to Combat a Terrorist Attack Using Modern Communications

By Milica D. Djekic Combating the terrorist attack is a challenge for security, safety, and community. Through…

Best Practices for Balancing BYOD with Mobile Security

Protecting Sensitive Data in a Mobile-First World By JT Keating, Vice President of Product Strategy, Zimperium  …

Show Buttons
Hide Buttons