SecurityHeadhunter.com Inc., a central Florida-based security search firm, is focused on uniting the right candidates with the right companies in the information security space.
As a specialist in security recruiting, the company knows where and how to identify the talent, said SecurityHeadhunter.com President Wils Bell, adding that the company has […]
How it started
It started pretty much as usual. When you have a ZX Spectrum at home as a child, you will turn to the technology area anyway, but the question is where exactly. But during my childhood, I did not want to be a programmer, probably because my best […]
secureRevGroup, a Wakefield, Massachusetts-based information security professional services firm, started in 2009 as a division of The Revolution Group. InfoSec Institute recently spoke to Mark P. Aiello, CEO of president of the company, to get his take on various issues related to the information security industry.
What positions are currently […]
Robert Half Technology is ideally positioned to provide customers with a wide range of technology staffing solutions for their project, contract-to-hire and full-time staffing needs. InfoSec recently interviewed Lara Dodo, Robert Half Technology’s regional vice president responsible for Ontario, Manitoba and Quebec, about her take on some pressing issues […]
Focusing on the enterprise security, cyber risk and technology innovation spaces, http://www.lenznergroup.com/ is an executive search firm based in Williamsville, New York. Founded back in 1997, the company has established a track record in security, compliance and IT risk-management recruitment and strategic talent acquisition. InfoSec Institute recently asked Tracy […]
Interview with Caleb Barlow – Director of Application, Data & Mobile Security @ IBM Security Division
Caleb Barlow is currently the director of Application, Data and Mobile Security in the IBM Security division. Earlier he acted as the director of Unified Communications and Collaboration, SMB Solutions Development and held several other key positions at IBM. He has a track record of working with various products […]
Stuart McClure, CISSP, CNE, CCSE, is the co-author of Hacking Exposed 7: Network Security Secrets & Solutions which offers expert advice and defense strategies from the world-renowned Hacking Exposed team and shows IT security pros how to bolster their system’s security and defeat the tools and tactics of cyber-criminals.
Stuart is widely […]
George Kurtz, CISSP, is the co-author of Hacking Exposed 7: Network Security Secrets & Solutions. George is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. He is also an […]
Jeff Snyder is the President of SecurityRecruiter.com, an executive search firm focused on recruiting cyber security, information security, corporate security, physical security, global compliance and global privacy professionals. Jeff is a Certified MasterMind Executive Coach by the Executive Coaching University and he is certified as a Stakeholder Centered Executive […]
Joyce Brocaglia is the president and chief executive officer of Alta Associates, a Flemington, New Jersey-based executive recruitment firm. Founded in 1986, Alta focuses on the IT risk management, information security industry. Brocaglia recently took some time out of her busy schedule for an interview with InfoSec Institute.
Michael Tanji is CSO and VP of Strategic Development at Kyrus, where his duties have included helping to develop and market Carbon Black. A veteran of the US Army, Michael has served in both strategic and tactical assignments in the Pacific Theater, the Balkans, and the Middle East. He […]
Marius Corici is the Co-Founder and CEO of Hack a Server. He is a serial entrepreneur and has been involved with various industries. In 2003 he started a business offline in the plumbing industry and co-founded ITS Group, a franchise for Romstal Company, the biggest plumbing installations retailer in […]
Malware threats have become very common these days. In the past, many honeypots have been created to detect malware propagation over the network. These honeypots trick the malware into believing that they are a part of the network. These honeypots are however isolated and once they have been infected, […]
Wolf Halton is a popular Speaker on topics of Internet Security, Linux and Open-Source Adoption, and Project Management Strategies. He’s the founder of SourceFreedom.com. He currently is a Senior (Linux Network) Infrastructure Engineer at Lyrasis.
How did you first get interested in computers?
My first access to computers came about because I was […]
Tony Busseri is the CEO of Route1. He leads the management team in executing Route1’s strategic vision. Mr. Busseri is an entrepreneurial executive with a track record of producing results and shareholder value. He is committed to delivering Route1 solutions to customers and advancing excellence in the organization.
Mr. Busseri […]
Charles Weaver is the co-founder and CEO of the MSPAlliance. In addition to running the daily operational operations of the association, he writes and speaks extensively around the world on issues and topics related to the managed services industry.
Prior to founding the MSPAlliance, Mr. Weaver was an editor for […]
Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the author of Wireless Security: A Beginner’s Guide (McGraw-Hill; 2012), the founder and president of Leet Systems, a next-generation security service provider, and Frigdo.com, a free online events search engine. He is currently a senior security consultant for Integralis, Inc., where […]
Interview with Joshua Arvin Lat: the Kaspersky International Cup 2012 and Kaspersky Asia Pacific & MEA Cup 2012 winner
For today’s hot seat we have Joshua Arvin Lat and his SOUL system. Joshua Arvin Lat is a Filipino software engineer or web developer who recently graduated Bachelor of Science in […]
This is an interview with Richard Bejtlich, Chief Information Security Officer at Mandiant.
1. We have readers with varying levels of information security experience. Please describe the role of a CISO in general, and more specifically your role is at Mandiant.
Because I define security as “the process of maintaining an […]
Profile Subject: Doug Steelman
Doug Steelman is the Chief Information officer of Dell SecureWorks, where he leads the defense of Dell SecureWork’s networks.
Before joining Dell SecureWorks, Steelman was the Director of the U.S. Department of Defense (DoD) Dynamic Network Defense Operations for U.S. Cyber Command. In that role, he was […]