April 2018

April 2018

Apr 262018

The FinTech Revolution: A Look at Compliance

| Chief Information Security Officer

The rapid evolution of financial technology (fintech) in recent years has positively disrupted the financial services industry in terms of how banks and other institutions, such as insurance and accounting companies, as well as stock brokerages, offer services and customer experience. As nearly all customer data is being transferred from file cabinets to digital vaults, […]

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Apr 242018

Blockchain: The Future of Cybersecurity?

| Senior Ethical Hacker

The need to protect critical information is nothing new. From securing social security numbers to health records and financial information, businesses have been protecting sensitive data for decades. However, throughout history thieves have proven that where there’s a will, there’s a way. As companies now rely on the internet and technology more than ever, new […]

Geoffrey Pamerleau

Senior Ethical Hacker

Geoffrey Pamerleau joined Armor as a senior ethical hacker bringing 10 years of expertise in IT and cyber security to the Threat Resistance Unit (TRU). Before joining Armor, Geoff was a Computer Network Operator for the NSA, where he was tasked with performing computer network exploitation operations. He served in the United States Air Force with distinction as a Cyberspace Operations Officer. Prior to his commission, Geoff received a Bachelor’s in Computer Science with a focus on Cyberwarfare from the United States Air Force Academy. While there, Geoff was a member of the Academy’s Cyber Warfare Club and competed in National and International information security competitions. Geoff has certifications in incident handling and penetration testing from SANS and Offensive Security. (GCIH, GPEN, and OSCP).

Apr 192018

SMBs & Security: Focusing on Budget

| Account Executive

You can ask other business executives to what they attribute their success and likely receive a myriad of responses ranging from strategic planning to operations and people. While there’s no right or wrong answer, budget allocation is one of the more critical components for a strong and successful company, especially for small and mid-sized businesses […]

Cody Sandone

Account Executive

With more than 10 years in sales roles, Cody is responsible for helping businesses and clients navigate security and compliance challenges associated with hosting sensitive data across on-prem, public or private cloud environments, as part of their decision-buying process for Armor's offerings. In addition, Cody founded and owns Sandone Enterprises LLC, an industrial recycling brokerage services firm, and previously worked for AAA Recycling and Impact Realty Group, LLC.

Apr 172018

Enough with the Cybersecurity Talent Shortage

| Head of Security

Everyone, including us, continues to harp about the cybersecurity talent gap. But while we recognize the problem, no one ever offers advice or recommendations on how key organizations, such as educational institutions, security groups and private companies, can help mend it and begin producing educated, experienced workers in troves. The cybersecurity talent gap in numbers […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

Apr 122018

Crisis Communications in the Wake of a Cyberattack

| Head of Security

More than a decade ago, TJ Maxx experienced one of the earliest major credit card breaches, and it led to a significant negative impact on customer loyalty and profitability. Today, however, it appears headlines are littered with new reports of large-scale data breaches compromising customer’s personal and financial information… yet customers keep coming back. What […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

Apr 102018

Credit Card Skimming: Big Business for Data Thieves on the Dark Web

| Senior Threat Intel Analyst

What if I told you that for as little as $10, I could use your credit card without your knowledge or permission? Thanks to the Dark Web, I can. From track data dumps to cloned cards, the buyers and sellers on Dark Web forums are in the market for credit card information, and there are […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 52018

Ramping Up for GDPR

| Chief Compliance and Data Privacy Officer

The countdown is on. Only 50 days left until the UK’s General Data Protection Regulation (GDPR) goes into effect on May 25. Replacing the current Data Privacy Directive established in 1995, GDPR will still focus on the overall goal of protecting the data of EU citizens in an increasingly data-driven world. While both directives seek […]

Nancy Free

Chief Compliance and Data Privacy Officer

Nancy Free, Armor's Chief Compliance and Data Privacy Officer, has over 20 years of IT experience, including IT governance, risk, compliance, and audit. She has spent over 15 years in the IT Security field leading IT and compliance teams in a variety of industries, including: energy, transportation, construction, mortgage lending, healthcare, and retail.

Apr 32018

Stolen PII & Ramifications: Identity Theft and Fraud on the Dark Web

| Senior Threat Intel Analyst

When the U.S. Department of Justice announced the seizure of AlphaBay last year, they closed a criminal marketplace on the Dark Web known to have trafficked in everything from illegal drugs to malware over the course of two years. At the time of the takedown, AlphaBay was home to more than 350,000 listings, many of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.