Press Quotes and Interviews:

Interviews can be arranged by telephone or in person. For any additional information, please use the contact form.

Medical devices at risk: 5 capabilities that invite danger
July 3, 2017 - CSO Online

Will the Olympics ‘payment ring’ jumpstart NFC demand?
July 27, 2016 - CSO Online

Information Security Posture: Experts on the Most Overlooked Factors in Evaluating Organizational Infosec Posture
June 30, 2016 - Digital Guardian

Hats of Many Colors: How Ethical Hackers Could Benefit Your Enterprise
May 1, 2016 - Business Reporter

FBI says it may be able to unlock San Bernardino iPhone without Apple’s help
March 22, 2016 - Business Reporter

NTT Com Security Issues Risk: Value Research Report Highlighting Importance Of Data Security In Organizations
February 15, 2016 - Source Security

Experts on the Data Loss Prevention (DLP) Market in 2016 & Beyond
December 15, 2015 - Digital Guardian

Developers find themselves in hackers’ crosshairs
September 29, 2015 - CSO Online

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
September 28, 2015 - Digital Guardian

Exploding Chip Could Thwart Cyberthieves
September 22, 2015 - Tech News World

10 Ways Wearables Put Your Network in Serious Danger
September 14, 2015 - IT Business Edge

Malware Targets Jailbroken iPhones, Steals Some 225,000 Apple Accounts
August 31, 2015 - Re/Code

Smartwatches aren't so clever when it comes to security
August 17, 2015 - SC Magazine UK

Interview: Chris Camejo, Director of Assessment Services for NTT Com Security
July 23, 2015 - InfoSec Institute

How Will Smart Cities Defend Against Hackers?
July 8, 2015 - The Network

Report: Ed Sector Target of More Malware Events than any Other
June 23, 2015 - The Journal

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
June 17, 2015 - Digital Guardian

Would your boss pay to automatically destroy employees' inappropriate emails and texts?
February 4, 2015 - The Verge

Yarrr, Matey: Care to Share Yer Files?
February 2, 2015 - Ozy

Cyber Monday, Black Friday Raise New Data Security Concerns
December 1, 2014 - Politic 365

'Enlightened' Non-IT Execs More Likely To Run Secure Organization
November 21, 2014 - Wall Street & Technology

Only about One-Third of Data Completely Secure, Say U.S. Executives in Survey
November 12, 2014 - Business Wire

Cyber Crusaders
November 10, 2014 - Security Management

Coming Next Fall: More Chip and PIN Cards in the U.S.
October 28, 2014 - U.S. News & World Report

Obama's Executive Order On Payment Fraud Falls Short On Boosting Security, Say Experts
October 20, 2014 - CRN

Will Retailers Get In Line For Mobile Payments?
October 17, 2014 - CRN

Russian Cybercriminals Aim At U.S. Bank Accounts; Malware Infects ATMs
October 8, 2014 - CRN

Will Wearable Devices Lead To More Theft?
October 7, 2014 - IDG Connect

Visa risk manager rescues small retailer from credit card fraud
September 29, 2014 - TechTarget

Are Your Legacy Systems A Security Vulnerability?
September 28, 2014 - Global Delivery Report

Q&A: What Home Depot customers can now expect
September 11, 2014 - Third Certainty

Retail Breaches Could Spur Channel Business, Modernized Payment Systems
September 11, 2014 - CRN

What Experts Say is the Single Largest Security Threat to Your Company’s Reputation
August 8, 2014 - Online Reputation Management

MDM is Terrible: When Security Solutions Hurt Security
August 6, 2014 - PC Magazine SecurityWatch

Black Hat 2014 spotlights mobile device management, modem threats
August 6, 2014 - Tech Page One

How 'Backoff' Malware Works and Why Banks Should Care
August 4, 2014 - American Banker

Microsoft Fixes 24 Browser Flaws, Adobe Repairs Flash Player Bug
June 8, 2014 - CRN

True Detectives: VARs On The Case As The Need For Incident Response Strategies Gets More Evident Every Day
June 7, 2014 - CRN

10 ways to strengthen web application security
June 17, 2014 - mrc’s Cup of Joe Blog

New OpenSSL breach is no Heartbleed, but needs to be taken seriously
June 6, 2014 - ZDNet

Time to modernize thinking, technology in fighting malware
May 9, 2014 - CSO

Microsoft issues workaround for Internet Explorer bug
April 30, 2014 - USA Today

Adobe Critical Flash Player Update Repairs Flaw Used In Targeted Attacks
April 28, 2014 - CRN

Why security professionals need to get more creative with penetration testing (and how to do it)
April 16, 2014 - CSO

Hook, Line and Tinder: Scammers Love Dating Apps
April 11, 2014 - NBC News

DDoS Attacks Get Trickier, Traditional Defenses Fall Short
March 17, 2014 - Wall Street & Technology

Navy network hack has valuable lessons for companies
March 8, 2014 - CSO

Digi-Ransoms: Meetup.com Latest in Long History of Cyber Hostages
March 4, 2014 - NBC News

12 Ways to Disaster-Proof Your Critical Business Data
March 4, 2014 - CIO

PCI DSS 3.0 is an evolution, not a revolution
January 12, 2014 - CSO

Rising impact of Target breach indicates deeper hack into systems
January 10, 2014 - CSO

'Worst breach in history' puts data-security pressure on retail industry
January 10, 2014 - NBC News

Target hack: Tips for all customers
January 10, 2014 - CNN Money

Target customers advised to be vigilant
January 10, 2014 - USA Today

Shopping tip: Use the credit, forget the debit
December 28, 2013 - CBS Evening News

Popular Boston Restaurant Group Reports Credit Card Data Theft
December 28, 2013 - WWBZ Boston

Insider Threats: Are Your Customers Prepared For Having An Edward Snowden On Staff?
December 23, 2013 - CRN

Target’s Vast Data Breach Prompts Call For Risk-Based Security Measures
December 19, 2013 - CRN

Businesses Are Bad At Risk-Assessment, And That's Good For The Channel
December 12, 2013 - CRN

Patch Tuesday: Microsoft Fixes Critical Zero-Day Flaw, Issues Browser Update
December 10, 2013 - CRN

Cloud-Based DDoS Protection Is Easily Bypassed, Says Researcher
August 1, 2013 - CRN

DDoS Attacks Getting Bigger, Report Finds
July 31, 2013 - Network Computing

Network Access Control Gains Traction With BYOD
July 29, 2013 - CRN

Microsoft Reverses Course On Bug Bounties With Reward Program
June 19, 2013 - CRN

Password Pilfering: Amazon, Twitter, Evernote Take On The Identity Crisis
May 31, 2013 - CRN