Press Quotes and Interviews:
Interviews can be arranged by telephone or in person. For any additional information, please use the contact form.Medical devices at risk: 5 capabilities that invite danger
July 3, 2017 - CSO Online
Will the Olympics ‘payment ring’ jumpstart NFC demand?
July 27, 2016 - CSO Online
Information Security Posture: Experts on the Most Overlooked Factors in Evaluating Organizational Infosec Posture
June 30, 2016 - Digital Guardian
Hats of Many Colors: How Ethical Hackers Could Benefit Your Enterprise
May 1, 2016 - Business Reporter
FBI says it may be able to unlock San Bernardino iPhone without Apple’s help
March 22, 2016 - Business Reporter
NTT Com Security Issues Risk: Value Research Report Highlighting Importance Of Data Security In Organizations
February 15, 2016 - Source Security
Experts on the Data Loss Prevention (DLP) Market in 2016 & Beyond
December 15, 2015 - Digital Guardian
Developers find themselves in hackers’ crosshairs
September 29, 2015 - CSO Online
BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
September 28, 2015 - Digital Guardian
Exploding Chip Could Thwart Cyberthieves
September 22, 2015 - Tech News World
10 Ways Wearables Put Your Network in Serious Danger
September 14, 2015 - IT Business Edge
Malware Targets Jailbroken iPhones, Steals Some 225,000 Apple Accounts
August 31, 2015 - Re/Code
Smartwatches aren't so clever when it comes to security
August 17, 2015 - SC Magazine UK
Interview: Chris Camejo, Director of Assessment Services for NTT Com Security
July 23, 2015 - InfoSec Institute
How Will Smart Cities Defend Against Hackers?
July 8, 2015 - The Network
Report: Ed Sector Target of More Malware Events than any Other
June 23, 2015 - The Journal
BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
June 17, 2015 - Digital Guardian
Would your boss pay to automatically destroy employees' inappropriate emails and texts?
February 4, 2015 - The Verge
Yarrr, Matey: Care to Share Yer Files?
February 2, 2015 - Ozy
Cyber Monday, Black Friday Raise New Data Security Concerns
December 1, 2014 - Politic 365
'Enlightened' Non-IT Execs More Likely To Run Secure Organization
November 21, 2014 - Wall Street & Technology
Only about One-Third of Data Completely Secure, Say U.S. Executives in Survey
November 12, 2014 - Business Wire
Cyber Crusaders
November 10, 2014 - Security Management
Coming Next Fall: More Chip and PIN Cards in the U.S.
October 28, 2014 - U.S. News & World Report
Obama's Executive Order On Payment Fraud Falls Short On Boosting Security, Say Experts
October 20, 2014 - CRN
Will Retailers Get In Line For Mobile Payments?
October 17, 2014 - CRN
Russian Cybercriminals Aim At U.S. Bank Accounts; Malware Infects ATMs
October 8, 2014 - CRN
Will Wearable Devices Lead To More Theft?
October 7, 2014 - IDG Connect
Visa risk manager rescues small retailer from credit card fraud
September 29, 2014 - TechTarget
Are Your Legacy Systems A Security Vulnerability?
September 28, 2014 - Global Delivery Report
Q&A: What Home Depot customers can now expect
September 11, 2014 - Third Certainty
Retail Breaches Could Spur Channel Business, Modernized Payment Systems
September 11, 2014 - CRN
What Experts Say is the Single Largest Security Threat to Your Company’s Reputation
August 8, 2014 - Online Reputation Management
MDM is Terrible: When Security Solutions Hurt Security
August 6, 2014 - PC Magazine SecurityWatch
Black Hat 2014 spotlights mobile device management, modem threats
August 6, 2014 - Tech Page One
How 'Backoff' Malware Works and Why Banks Should Care
August 4, 2014 - American Banker
Microsoft Fixes 24 Browser Flaws, Adobe Repairs Flash Player Bug
June 8, 2014 - CRN
True Detectives: VARs On The Case As The Need For Incident Response Strategies Gets More Evident Every Day
June 7, 2014 - CRN
10 ways to strengthen web application security
June 17, 2014 - mrc’s Cup of Joe Blog
New OpenSSL breach is no Heartbleed, but needs to be taken seriously
June 6, 2014 - ZDNet
Time to modernize thinking, technology in fighting malware
May 9, 2014 - CSO
Microsoft issues workaround for Internet Explorer bug
April 30, 2014 - USA Today
Adobe Critical Flash Player Update Repairs Flaw Used In Targeted Attacks
April 28, 2014 - CRN
Why security professionals need to get more creative with penetration testing (and how to do it)
April 16, 2014 - CSO
Hook, Line and Tinder: Scammers Love Dating Apps
April 11, 2014 - NBC News
DDoS Attacks Get Trickier, Traditional Defenses Fall Short
March 17, 2014 - Wall Street & Technology
Navy network hack has valuable lessons for companies
March 8, 2014 - CSO
Digi-Ransoms: Meetup.com Latest in Long History of Cyber Hostages
March 4, 2014 - NBC News
12 Ways to Disaster-Proof Your Critical Business Data
March 4, 2014 - CIO
PCI DSS 3.0 is an evolution, not a revolution
January 12, 2014 - CSO
Rising impact of Target breach indicates deeper hack into systems
January 10, 2014 - CSO
'Worst breach in history' puts data-security pressure on retail industry
January 10, 2014 - NBC News
Target hack: Tips for all customers
January 10, 2014 - CNN Money
Target customers advised to be vigilant
January 10, 2014 - USA Today
Shopping tip: Use the credit, forget the debit
December 28, 2013 - CBS Evening News
Popular Boston Restaurant Group Reports Credit Card Data Theft
December 28, 2013 - WWBZ Boston
Insider Threats: Are Your Customers Prepared For Having An Edward Snowden On Staff?
December 23, 2013 - CRN
Target’s Vast Data Breach Prompts Call For Risk-Based Security Measures
December 19, 2013 - CRN
Businesses Are Bad At Risk-Assessment, And That's Good For The Channel
December 12, 2013 - CRN
Patch Tuesday: Microsoft Fixes Critical Zero-Day Flaw, Issues Browser Update
December 10, 2013 - CRN
Cloud-Based DDoS Protection Is Easily Bypassed, Says Researcher
August 1, 2013 - CRN
DDoS Attacks Getting Bigger, Report Finds
July 31, 2013 - Network Computing
Network Access Control Gains Traction With BYOD
July 29, 2013 - CRN
Microsoft Reverses Course On Bug Bounties With Reward Program
June 19, 2013 - CRN
Password Pilfering: Amazon, Twitter, Evernote Take On The Identity Crisis
May 31, 2013 - CRN