cloud network segmentation

cloud network segmentation

Mar 82018

A Girl & Her Games: Looking Back on Computer Engineering

| Security Operations Center Director

Women make up only 29% of the science and engineering workforce, with only 10.7% focusing their careers in electrical or computer hardware engineering, according to the National Science Board’s “Science and Engineering Indicators 2016” report. Studying these statistics, it got me thinking… what was my first interaction with technology and programming? One weekend my Brownie® (girl scouts […]

Holly Dale

Security Operations Center Director

Holly Dale’s two decades in cybersecurity has led her to become the SOC Director at Armor. Prior to Armor, Holly held positions contracted to Oncor Energy and National Nuclear Security Administration under the Department of Energy (NNSA/DOE), including Information System Security Officer (ISSO) cyber security Subject Matter Expert (SME), Senior Security Analyst, Sr. Forensic Investigator, and Sr. Incident Responder. Holly was a founding member of NNSA's Information Assurance Response Center (IARC), as well as a member of the Secret Services's Las Vegas Electronic Crimes Task Force (LV-ECTF) and the FBI-led Nevada Cyber Crimes Task Force (NCCTF), working with numerous city, county, state and federal agencies in each task force.

Oct 132017

Farewell to Audit Season; Hello Continuous Compliance

| Chief Compliance and Data Privacy Officer

I fondly remember a time when “Audit Season” was just that — a season. Once a year, auditors would appear – with and without fanfare –- to thoroughly test our security controls. It was a consolidated, one-and-done process. It was a magical time. But it wasn’t meant to last. Before too long, driven by improvements […]

Nancy Free

Chief Compliance and Data Privacy Officer

Nancy Free, Armor's Chief Compliance and Data Privacy Officer, has over 20 years of IT experience, including IT governance, risk, compliance, and audit. She has spent over 15 years in the IT Security field leading IT and compliance teams in a variety of industries, including: energy, transportation, construction, mortgage lending, healthcare, and retail.

Sep 152017

Keeping Them Out of Your Vault: Network Segmentation in the Cloud

When does a breach become lethal? Is it the initial compromise, possibly due to unpatched vulnerabilities? Or, is it the exfiltration of valuable data – when a compromise becomes a breach and potentially a headline in the news cycle? Semantics aside, there’s another, often ignored aspect in the evolution from compromise to breach, one with […]