Interviews, Women in Cyber, Dorit Dor
Dr. Dorit Dor, Vice President of Products for Check Point, has achieved a lot in her 25 years with the company. Currently, she manages all product definition and development functions for both the enterprise and consumer divisions of the company and her core...
CISO Interviews, Featured, Frank Gillman
It’s no secret that employees – whether they’re your employees, a client's, or a partner’s – are the weakest link in your cybersecurity program. Regardless of an organization’s product, service, size, or industry, employees play an integral role in ensuring the...
CISO Interviews, Bryan Kissinger
Shipping companies hire captains to get cargo from Point A to Point B. The captain is expected to deliver the cargo safely and efficiently. The captain has a number of tools at his disposal including a ship, a crew, a map, and a lot of trust, to ensure success....
CISO Interviews, Jimmy Xu
Jimmy Xu, Director of DevSecOps & Cloud Security at Trace3, recently presented “Mastering DevSecOps.” Jimmy’s presentation generated lots of great questions, which he graciously answered below. If you missed his presentation or would like to watch it again, you can...
CISO Interviews, Paul Yoder
Schools will struggle with more than COVID-19 as kids return this Fall – whether virtually, on campus, or a combination of the two. Colleges and universities contain lots of sensitive data that hackers cherish. The admissions department holds student addresses,...
CISO Interviews, Dave Snyder
No man is an island. The same can be said about your business. Your organization relies on countless people for its survival, let alone its success. Ironically, many of these contributors work for someone else. Suppliers, vendors, consultants, contractors, and other...