I recently had the honor of participating in an IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) event in Manhattan. This is coverage of the panel I was on which discussed…
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes…
Interview in SecurityWeek around the pros/cons of legacy antivirus endpoint and next-gen antivirus endpoint solutions. There is bad feeling between what can be described as traditional antivirus (Trad AV) and…
As infrastructures become increasingly fragmented and distributed, the need for a strong application security program becomes more and more critical. Cloud-based hosts, server-less architectures, and Applications as a Service require mature…
The MIAX Security team was honored to be a case study on deploying a real-world, fully integrated Privileged Access Management solution. The MIAX Options Exchange needed more than a way to…
A case study on the enterprise-wide deployment of a fully integrated privileged account management solution, the potential deployment challenges, and the numerous post-deployment security and productivity benefits. Challenge: Provide Regulatory…
Recently, I had the opportunity to sit down with Morey Haber, VP of Technology, BeyondTrust to discuss the future of biometrics and the role it played in advanced authentication techniques. While…
One2One Summit podcast where David Cass, CSO for IBM Cloud and SaaS solutions, and I sit down and discuss the challenges of modern technology in a legacy environment, the hiring…
A SecurityCurrent interview around the demise of passwords and a need for a capable password-replacement solution. Ten CISOs from across industries weigh in on the effectiveness of passwords, with most predicting…
Recap of a panel discussion which focused on a few key data security topics and included Mike Marsilio, director of security and compliance, DTI; Mark Connelly, CISO, Thomson Reuters; Steve…
A profile piece by the folks at T.E.N./ISE after winning the 2014 North America Information Security Project of the Year. While these days, there are countless organizations who provide networking…
CISO’s and Security executives from across the industry talk about how their role has grown in prominence in the capital markets industry. They come from different backgrounds: some have experience…
To ensure both safety and survival, we all have to recognize our personal responsibility for information security. Admiral Michael Rogers, the director of the National Security Agency, said he expects…
An interview with Info Security magazine around the maturation of advanced evasion techniques and how attackers abilities to evade detection have matured. With the average cost of a data breach…
Technically Philly held a panel discussion featuring several prominent local CISO’s to talk about the evolving cybersecurity industry, the challenges we face with bring your own device, and what the…
A Politics of Information Security Webcast Earlier this year, a panel of Chief Security Officers from some of the nation’s highest profile companies met to talk about how to get…
SC Magazine: Diversity, one key to solving cybersecurity job gap
I recently had the honor of participating in an IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) event in Manhattan. This is coverage of the panel I was on which discussed…
SecurityCurrent: Podcast with Barmak Meftah, President and CEO AlienVault, About Threat Detection and Response
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes…
SecurityWeek: Inside The Competitive Testing Battlefield of Endpoint Security
Interview in SecurityWeek around the pros/cons of legacy antivirus endpoint and next-gen antivirus endpoint solutions. There is bad feeling between what can be described as traditional antivirus (Trad AV) and…
SecurityInnovation: CISOs Guide to Application Security
As infrastructures become increasingly fragmented and distributed, the need for a strong application security program becomes more and more critical. Cloud-based hosts, server-less architectures, and Applications as a Service require mature…
SC Magazine: Case study on Privileged Access
The MIAX Security team was honored to be a case study on deploying a real-world, fully integrated Privileged Access Management solution. The MIAX Options Exchange needed more than a way to…
Privileged Account Management: A BeyondTrust Case Study
A case study on the enterprise-wide deployment of a fully integrated privileged account management solution, the potential deployment challenges, and the numerous post-deployment security and productivity benefits. Challenge: Provide Regulatory…
The Current State and Future of Biometrics
Recently, I had the opportunity to sit down with Morey Haber, VP of Technology, BeyondTrust to discuss the future of biometrics and the role it played in advanced authentication techniques. While…
One2One Summits: Episode 9: David Cass and John Masserini
One2One Summit podcast where David Cass, CSO for IBM Cloud and SaaS solutions, and I sit down and discuss the challenges of modern technology in a legacy environment, the hiring…
SecurityCurrent: 10 CISOs Say Passwords are Failing and Must be Augmented or Supplanted
A SecurityCurrent interview around the demise of passwords and a need for a capable password-replacement solution. Ten CISOs from across industries weigh in on the effectiveness of passwords, with most predicting…
Thomson Reuters: Responses To Data Security Threats At Law Firms
Recap of a panel discussion which focused on a few key data security topics and included Mike Marsilio, director of security and compliance, DTI; Mark Connelly, CISO, Thomson Reuters; Steve…
T.E.N./ISE Success Story: John Masserini
A profile piece by the folks at T.E.N./ISE after winning the 2014 North America Information Security Project of the Year. While these days, there are countless organizations who provide networking…
Waters Technology: Rise of the CISO
CISO’s and Security executives from across the industry talk about how their role has grown in prominence in the capital markets industry. They come from different backgrounds: some have experience…
CIO Magazine: We All Work In Information Security Now
To ensure both safety and survival, we all have to recognize our personal responsibility for information security. Admiral Michael Rogers, the director of the National Security Agency, said he expects…
InfoSecurity Magazine: Explosion in Advanced Evasion Techniques (AET)
An interview with Info Security magazine around the maturation of advanced evasion techniques and how attackers abilities to evade detection have matured. With the average cost of a data breach…
Technically Philly: Fears challenge ‘bring your own device’ trend
Technically Philly held a panel discussion featuring several prominent local CISO’s to talk about the evolving cybersecurity industry, the challenges we face with bring your own device, and what the…
The CISO Job – Getting and Keeping It
A Politics of Information Security Webcast Earlier this year, a panel of Chief Security Officers from some of the nation’s highest profile companies met to talk about how to get…