August 2017

August 2017

Aug 242017

Women in Technology: A Natural Fit

| Security Operations Center Director

In light of the recent repugnant comments from an engineer of the world’s preeminent search engine provider, it seems appropriate to use this vitriol as an opportunity to set the record straight.  The engineer’s diatribe not only revealed a deep-seeded personal resentment of women but brought attention to an overall misconception of the pervasiveness of […]

Holly Dale

Security Operations Center Director

Holly Dale’s two decades in cybersecurity has led her to become the SOC Director at Armor. Prior to Armor, Holly held positions contracted to Oncor Energy and National Nuclear Security Administration under the Department of Energy (NNSA/DOE), including Information System Security Officer (ISSO) cyber security Subject Matter Expert (SME), Senior Security Analyst, Sr. Forensic Investigator, and Sr. Incident Responder. Holly was a founding member of NNSA's Information Assurance Response Center (IARC), as well as a member of the Secret Services's Las Vegas Electronic Crimes Task Force (LV-ECTF) and the FBI-led Nevada Cyber Crimes Task Force (NCCTF), working with numerous city, county, state and federal agencies in each task force.

Aug 172017

The Five Points of Cloud-Native Architecture

Inspired by French architect, Le Corbusier, Flavio Andrade, Armor VP of Product Marketing, explores how to develop a cloud-native architecture in the cloud.

Aug 142017

Securing Your Cloud: The Impact of POPIA

Co-authors: Andrew Kirkland – CyberTAN CEO, Kurt Hagerman – Armor CISO   The race is on. Adopting cloud is fast becoming a critical consideration for increasing competitiveness and profitability. “Ignore it at your peril”, some will say. There may be a lot of truth in keeping up with the fast-paced technological advancements, but there is one question […]

Aug 92017

Using a ‘defense in depth’ strategy to thwart ransomware attacks

Several recent ransomware and malware attacks have highlighted the unintended consequences that have resulted from information dumps published by the illusive group known as The Shadow Brokers. Multiple other actors have since taken the capabilities that were leaked and successfully used them to penetrate systems and compromise data. Among their recent high-profile events were the […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Aug 32017

New Perils of Public Cloud Compliance: Vendor Management Best Practices

| Chief Information Security Officer

“Know thyself.” It’s a mindset more cloud-ready organizations should adopt before they even consider bringing in a cloud vendor. However, far too many are still content to look before they leap, sometimes to disastrous results. Learn why self-discovery before vendor implementation can keep you more compliant, efficient and, more importantly, safe in the cloud.

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Aug 12017

Cutting through the Noise: Are You Being Sold AI or Pattern Matching?

Many vendors are fudging terms when trying to sell their security systems. Here’s what you need to know when you buy. At the recent RSA Conference, you might have heard hundreds of people repeating the words “we have the best artificial intelligence (AI) and machine learning.” If you happened to be in one of those […]