8:44 am, May 29, 2015

Search Result

Search Tags:  Tom Kellermann

Hope springs eternal for cyber laws after House approval

Lawmakers overwhelmingly passed the National Cybersecurity Protection Advancement Act and the Protecting Cyber Networks Act this week. These are the first cybersecurity information sharing bills with broad support in more than five years.

Tags: Cybersecurity , Technology , House , Information sharing , Congress , Mike McCaul , Bob Dix , Juniper Networks , Trend Micro , DHS , ODNI , NCCIC , CTIIC , Jason Miller

Thursday - 04/23/2015, 12:38pm EDT

The Accidental Insider Threat: Is Your Organization Ready?

Today, most organizations are keenly aware of deliberate insider threats that pose risk to their cybersecurity posture. But recently the internal threat has morphed. More than ever "accidental insiders" sources of vulnerability who are not maliciously trying to cause harm, are unknowingly presenting major risks which can compromise an organization and its infrastructure. This panel sponsored by Booz Allen Hamilton, will bring together top industry experts to discuss the threats posed by these accidental insiders. Several questions and issues will be explored including: How do you define and characterize accidental insider threats? How prevalent are these threats? How do you measure the impact of an accidental insider threat incident after it has occurred? How does legislation and policy affect what organizations can do to address these threats?

Tags: Raynor Dahlquist , Angela McKay , Michael C. Theis , Technology , Booz Allen , Booz Allen Expert Voices , cyber , Cybersecurity

Tuesday - 09/25/2012, 05:50pm EDT

Tom Kellermann


Tuesday - 09/25/2012, 07:32pm EDT

Protecting the mobile environment

Host John Gilroy is joined by AirPatrol Corporation CTO Tom Kellermann. They will discuss how to control data leakage from mobile devices.
November 22, 2011

Tags: Technology , John Gilroy , Air Patrol Corporation , Mobile devices , Bring your own device , federal IT , mobile risk , mobile security , data leak protection

Tuesday - 11/22/2011, 11:08pm EST

More IE holes pose a threat

Internet Explorer could allow a hacker to read files on a person's computer.

Tags: Cybersecurity Update , Core Security , Commission on Cyber Security , Windows , Internet Explorer , IE

Friday - 01/29/2010, 09:30am EST