facebook
Getting the top-level security is a must for many organizations in an increasingly complicated cyberworld.  Using experience garnered from military-grade security solutions in the Australian Department of Defense, Covata has created unique solutions to deal with the myriad threats in play.  Mike Fleck, Covata’s VP Security, talks about cybersecurity concerns of small businesses and today’s...
facebook
With data security regulations becoming increasingly critical – especially with the upcoming General Data Protection Regulation (GDPR) – organizations and companies need solutions that can ensure compliance across their systems in order to function optimally.  Kishor Vaswani, CEO of ControlCase, discusses what modern compliance is about and why automation is the only way forward. Tell...
facebook
As privacy concerns grow, consumers are looking for solutions to keep their internet use private, secure, and unrestricted.  Virtual Private Networks (VPNs) provide an ideal solution but not all are created equal. Jeremy Palmer, Vice President of IPVanish, discusses VPN’s, user security, and why people need to know that if they aren’t the customer, they...
facebook
As technology development is broken down into smaller and smaller parts with hundreds of vendors involved in the creation of products – Berkeley Varitronics stands out as a one-stop-shop for carefully designed technologies. Scott Schober, CEO of Berkeley Varitronics, discusses why some of the biggest companies in the world use Berkeley’s Varitronics as their go-to...
facebook
Secure communication is more important than ever as more and more data of all types, from medical records to government documents are being shared.  Bill Ho, CEO of Biscom, discusses the importance of securing communications and maintaining data integrity in today’s environment. Tell us about Biscom and how you get involved in document delivery security?...
facebook
Controlling access to applications and an organization’s data stored within  is critical as data becomes more important and valuable as a resource. While many solutions exist to secure data, they often rely only on user roles and passwords to enable access. Niklas Jakobsson, CEO of Axiomatics, discusses why dynamic authorization, which places access requests within...
facebook
Data is key to providing modern and complex problems and providing services in a timely fashion.  However, data is often stored or accessed in ways that are single-use and are difficult to extract.  Peter L. Levin, Co-founder and CEO of Amida, believes that by focusing on the upstream sources of data, data management, interoperability and...
facebook
Website security for small businesses can be just as important as it is for the big players.  However, misinformation regarding what steps can be taken to mitigate risk often means that many small businesses which depend on their website for direct sales or lead generation are at significant risk.  According to Tony Perez, CEO of...
facebook
Just like a well-thought-out business plan, building and maintaining an effective cyber security policy and apparatus is a key component of any business today.  Yet many businesses are unaware of the danger and the reality of the adage: “it isn’t a question of if, but when.”  Craig McDonald, CEO of MailGuard, is working not only...
facebook
Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some level of protection – both device and network-based. But, how do we deal with unknown threats? How do we discover critical data that we don’t even know that we don’t know...