Bylines and Blog Posts:
Byline: Security Sales & Integration - May 24, 2016What To Examine When Considering Cyber Insurance
Byline: Business Solutions - October 10, 2016
6 Steps to Prevent Hackers From Attacking Your Systems’ Biggest Vulnerability
Blog Post: NTT Com Security Blog - March 28, 2016
Don't Blame Users For Fraud, Blame the System
Blog Post: NTT Com Security Blog - March 21, 2016
Apple vs. The FBI, What It Means To You - Part 3
Blog Post: NTT Com Security Blog - March 20, 2016
Apple vs. The FBI, What It Means To You - Part 2
Blog Post: NTT Com Security Blog - March 19, 2016
Apple vs. The FBI, What It Means To You - Part 1
Blog Post: NTT Com Security Blog - March 14, 2016
Staminus hack shows the importance of security basics
Blog Post:
NTT Com Security Blog - March 10, 2016
Incident Response Lessons from the IRS, Target, and Symantec
Blog Post: NTT Com Security Blog - February 26, 2016
A power grid hack has finally happened. Now what?
Blog Post: NTT Com Security Blog - February 25, 2016
The State of Modern Password Cracking: RSA Presentation Preview
Blog Post: NTT Com Security Blog - February 3, 2016
Email security lessons from Hillary Clinton, Sarah Palin, and the director of the CIA
Blog Post: NTT Com Security Blog - January 28, 2016
NSA hacking unit head tells us what we already knew about defending network
Blog Post: NTT Com Security Blog - January 28, 2016
Windows flaws show hazards of over-reliance on vulnerability scans
Byline: Security Info Watch - January 28, 2016
Closing and sealing network back doors to hackers
Blog Post: NTT Com Security Blog - January 26, 2016
Read the fine print on cyber insurance
Byline: Source Security - December 21, 2015
Cybersecurity And Risk Management To Gain Traction In Security Market During 2016
Byline: Business Solutions - December 8, 2015
Implementing Cybersecurity: 5 Keys To Success
Byline: Information Age - December 4, 2015 - With Stuart Reed, Kai Grunwitz, and Garry Sidaway
11 trends that will dominate cyber security in 2016
Byline: Help Net Security - April 2, 2015
How vulnerable is our critical national infrastructure?
Byline: Network World - September 23, 2014
Three critical changes to PCI DSS 3.0 that every merchant should know
Byline: Wall Street and Technology - September 18, 2014
Chip & Pain, EMV Will Not Solve Payment Card Fraud
Byline: Wall Street and Technology - August 20, 2014
Driving Information Security, From Silicon Valley to Detroit
Byline: Wall Street and Technology - July 14, 2014
Vigilante Justice on the Digital Frontier
Byline: Wall Street and Technology - June 24, 2014
Bank Fraud: It’s Not Personal, Just Business
Byline: Wall Street and Technology - May 19, 2014
Beyond Heartbleed: 5 Basic Rules To Reduce Risk
Byline: USA Today - January 9, 2014
The corporate key to agility -- and cybersecurity
Byline: CSO Magazine - September 11, 2013
A real-world approach to risk-based security planning
Byline: Secure Computing Magazine - September 3, 2013
Biting the silver bullet: Protecting corporate assets