Author Description

Author Posts

Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs

by Rick Lober, Defense and Intelligence Systems Division Vice President and General Manager, Hughes Network Systems UAV…

5 Things Everyone Needs to Know About Cyber security

Practical ways to prevent a cyber-attack by Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of…

The case study: cyber camouflage scenario

by Milica D. Djekic The military doctrine would suggest to us how camouflaging on the battlefield could…

Cloud Direct Connects: The Best Bet for Cyber Security

by Tim Fogarty, Director of Enterprise, Shamrock Consulting Group If you are a member of corporate IT…

Synthetic identity fraud and social engineering are growing concerns and on the rise

by Christina Luttrell With the customer, not present identity fraud becoming an increasingly prevalent issue, major shifts…

CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats

by Liviu Arsene, Global Cybersecurity Analyst, Bitdefender In a fast-changing landscape where large cyber attacks make the…

The Attribution Problem – Using PAI to Improve Actor Attribution

By Brian Pate, SVP, Babel Street Within the cyber community, conventional wisdom is that malicious actors can…

Why CIOs/CISO’s Positions Are Becoming More Challenging

By Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company It’s your worst…

The Hottest Career on the Block

By Nick Galov Our world is changing fast. Thirty years ago, you left school, choose a potential…

The Critical Role TAPs Play in Network Security and Resiliency

By Alastair Hartrup, CEO, Network Critical Networks continue to be under persistent attack. As a matter of…

Show Buttons
Hide Buttons