Author Description

Author Posts

Shattered! Security in a Fragmented World of Workloads

By Satyam Tyagi, Director Product Management, ColorTokens Inc.  Look at me, I’m in tatters! Don’t you know…

Software Should Come with a “Nutrition” Label

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. During the latter half of the 18th Century and…

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or…

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang As software becomes more sophisticated, organizations of all sizes continue to harness…

Prioritizing Security in a Multi-Cloud World

By Scott Manson, Managing Director, Middle East & Turkey, McAfee Cloud awareness and adoption continues to grow,…

Operation Eligible Receiver – The Birth Place of Cyber security: Configurations

By Josh Paape More than twenty years ago, the National Security Agency conducted an exercise to test…

Why Wi-Fi Hacking Will Persist Despite WPA3

By Ryan Orsi, Director Product Management, WatchGuard Technologies In 2017, the famed Key Re-installation Attack or “Krack”…

Want to Secure Your Endpoints? Go Beyond the Endpoint

By Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc.  Traditional endpoint security control has always been about…

Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector

By John Attala, Director, North America, Endace The healthcare sector has been and continues to be under…

Security have and have-nots

How organizations can stay above “The Security Poverty Line” By Javvad Malik, security advocate, Alien Vault Way…

Show Buttons
Hide Buttons