Information Technology is the engine room of the modern business, according to recruitment consultancy ITHR (IT Human Resources) in London, England.
If that statement holds true, then it wouldn’t be a stretch to suggest that John Maughan, an ITHR senior recruiter focusing on the network-security arena, and Chris Currie, an […]
Tony Busseri is the CEO of Route1. He leads the management team in executing Route1’s strategic vision. Mr. Busseri is an entrepreneurial executive with a track record of producing results and shareholder value. He is committed to delivering Route1 solutions to customers and advancing excellence in the organization.
Mr. Busseri […]
Charles Weaver is the co-founder and CEO of the MSPAlliance. In addition to running the daily operational operations of the association, he writes and speaks extensively around the world on issues and topics related to the managed services industry.
Prior to founding the MSPAlliance, Mr. Weaver was an editor for […]
Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the author of Wireless Security: A Beginner’s Guide (McGraw-Hill; 2012), the founder and president of Leet Systems, a next-generation security service provider, and Frigdo.com, a free online events search engine. He is currently a senior security consultant for Integralis, Inc., where […]
Interview with Joshua Arvin Lat: the Kaspersky International Cup 2012 and Kaspersky Asia Pacific & MEA Cup 2012 winner
For today’s hot seat we have Joshua Arvin Lat and his SOUL system. Joshua Arvin Lat is a Filipino software engineer or web developer who recently graduated Bachelor of Science in […]
This is an interview with Richard Bejtlich, Chief Information Security Officer at Mandiant.
1. We have readers with varying levels of information security experience. Please describe the role of a CISO in general, and more specifically your role is at Mandiant.
Because I define security as “the process of maintaining an […]
Profile Subject: Doug Steelman
Doug Steelman is the Chief Information officer of Dell SecureWorks, where he leads the defense of Dell SecureWork’s networks.
Before joining Dell SecureWorks, Steelman was the Director of the U.S. Department of Defense (DoD) Dynamic Network Defense Operations for U.S. Cyber Command. In that role, he was […]
Profile Subject: Michael Peters
Michael Peters has been an independent information security consultant, executive, researcher and author, with more than 25 years of information technology and business leadership experience. His executive positions include Chief Information Security Officer CISO at CrossView Inc. (current), as well as previous positions of CSO at […]
As the world becomes increasingly digitized, IT security impacts more and more of our lives. Most ordinary citizens are unaware of how our important civic services- electricity, public transportation and water, not just telecommunications- are now dependent on computing and networking technologies.
Many industrial utilities are operated with SCADA, supervisory […]
In our ongoing series of interviews, this week Kevin Finisterre answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the work he does.
Kevin Finisterre is a principal of the security consultancy Digitalmunition, he enjoys testing the limits and is constantly […]
In our ongoing series of interviews, this week Haroon Meer answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the work he does.
Haroon Meer is the founder of Thinkst, an applied research company with a deep focus on information security. […]
In our ongoing series of interviews, this week Matthieu Suiche answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the work he does.
Suiche is director and founder of MoonSols, a computer security and kernel code consulting and software company. He […]
WhisperMonitor is a new software firewall and dynamic egress filtering tool from WhisperSystems. It comes pre-installed with the latest beta release of WhisperCore. The software lets you decide which outgoing connections to allow and deny as they happen, and create rules that permit specific apps to connect to the […]
There was a lot of attention paid to a new type of browser attack recently called the Boy in the Browser. To find out more about this technique, we contacted Amichai Shulman of Imperva to answer a few questions.
Shulman is Co-Founder and CTO of Imperva, where […]
In our ongoing series of interviews, this week David Litchfield answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the work he does.
David Litchfield is recognized as one of the world’s leading authorities on database security. He is the author […]
In our ongoing series of interviews, we got HD Moore to answer a few questions and pull back the curtain a bit on the methods, tools and motivation for the research he does discovering security exploits.
HD Moore is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the […]
Our latest interview is with Donald C. Donzal – perhaps best-known now as the founder and editor of The Ethical Hacker Network and ChicagoCon. Don had his first ‘real’ job in IT as a Systems Admin for a hospital. He later formed a successful consulting business , joined a startup, […]
Below is an interview conducted with Mike Rothman. Mike specializes in protecting networks and endpoints, security management, and compliance. He is one of the most sought after speakers and commentators in the security business. After 20 years in and around security, he’s one of the […]