Bylines and Blog Posts:

What To Examine When Considering Cyber Insurance
May 24, 2016 - Security Sales & Integration

6 Steps to Prevent Hackers From Attacking Your Systems’ Biggest Vulnerability
October 10, 2016 - Business Solutions

Don't Blame Users For Fraud, Blame the System
March 28, 2016 - NTT Com Security Blog

Apple vs. The FBI, What It Means To You - Part 3
March 21, 2016 - NTT Com Security Blog

Apple vs. The FBI, What It Means To You - Part 2
March 20, 2016 - NTT Com Security Blog

Apple vs. The FBI, What It Means To You - Part 1
March 19, 2016 - NTT Com Security Blog

Staminus hack shows the importance of security basics
March 14, 2016 - NTT Com Security Blog

Incident Response Lessons from the IRS, Target, and Symantec
March 10, 2016 - NTT Com Security Blog

A power grid hack has finally happened. Now what?
February 26, 2016 - NTT Com Security Blog

The State of Modern Password Cracking: RSA Presentation Preview
February 25, 2016 - NTT Com Security Blog

Email security lessons from Hillary Clinton, Sarah Palin, and the director of the CIA
February 3, 2016 - NTT Com Security Blog

NSA hacking unit head tells us what we already knew about defending networks
January 28, 2016 - NTT Com Security Blog

Windows flaws show hazards of over-reliance on vulnerability scans
January 28, 2016 - NTT Com Security Blog

Closing and sealing network back doors to hackers
January 28, 2016 - Security Info Watch

Read the fine print on cyber insurance
January 26, 2016 - NTT Com Security Blog

Cybersecurity And Risk Management To Gain Traction In Security Market During 2016
December 21, 2015 - Source Security

Implementing Cybersecurity: 5 Keys To Success
December 8, 2015 - Business Solutions

11 trends that will dominate cyber security in 2016
December 4, 2015 - Information Age - With Stuart Reed, Kai Grunwitz, and Garry Sidaway

How vulnerable is our critical national infrastructure?
April 2, 2015 - Help Net Security

Three critical changes to PCI DSS 3.0 that every merchant should know
September 23, 2014 - Network World

Chip & Pain, EMV Will Not Solve Payment Card Fraud
September 18, 2014 - Wall Street and Technology

Driving Information Security, From Silicon Valley to Detroit
August 20, 2014 - Wall Street and Technology

Vigilante Justice on the Digital Frontier
July 14, 2014 - Wall Street and Technology

Bank Fraud: It’s Not Personal, Just Business
June 24, 2014 - Wall Street and Technology

Beyond Heartbleed: 5 Basic Rules To Reduce Risk
May 19, 2014 - Wall Street and Technology

The corporate key to agility -- and cybersecurity
January 9, 2014 - USA Today

A real-world approach to risk-based security planning
September 11, 2013 - CSO Magazine

Biting the silver bullet: Protecting corporate assets
September 3, 2013 - Secure Computing Magazine