Back to Vendor Listings

Ron Green

Executive Vice President and Chief Information Security Officer, Mastercard As a young boy growing up in Philadelphia, Ron Green listened to his father and his uncles swap stories about their jobs as police officers. Ron knew that he, too, wanted to be a police officer when he grew up. When the time came, his father…

A CISO’s Guide to Phishing and Malware

A CISO’s Guide to Phishing and Malware examines real-world examples of advanced targeted attacks via email and social media to show how these evolving threats are increading an organization’s business risks. Cybercrime is very much a B2B affair with surging returns on investment. From a business perspective, there is always a number associated with a breach. For…

Beyond Trust – Privileged Account Management for Federal Agencies

Agencies grant access privileges easily and out of necessity, but they struggle to manage these privileges as employees move throughout divisions. Revoking unnecessary access tends to be forgotten and the process of recertification of access privileges is error-prone, time consuming, or worse, forgotten. “Insider and privilege misuse” was identified by the 2014 Verizon Data Breach…

Trend Micro – Elastic Infrastructure Needs Elastic Security

Organizations are adopting virtualization and cloud technologies as a foundation for their strategic business growth. Whether they deploy private cloud, public cloud or hybrid architectures, this is where IT investments are going today and in the years ahead. The bulk of new IT spending by 2016 will be for cloud computing platforms and applications, with nearly half of large…