cloud provider

cloud provider

Sep 202018

Diving Deeper: Phishing & BEC Scams

| Head of the Threat Resistance Unit

We continue with our ‘Diving Deeper’ series by discussing attack vectors that take advantage of human gullibility through what is arguably the most widely used business application on the Internet – email. We start by going through a brief history and introduction of phishing, spear phishing, and BEC scams; talk about how they are impacting […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Events

Mar 272018

Medecision Liberation 2018

Kim Ross Image

Kim Ross

Mar 82018

A Girl & Her Games: Looking Back on Computer Engineering

| Security Operations Center Director

Women make up only 29% of the science and engineering workforce, with only 10.7% focusing their careers in electrical or computer hardware engineering, according to the National Science Board’s “Science and Engineering Indicators 2016” report. Studying these statistics, it got me thinking… what was my first interaction with technology and programming? One weekend my Brownie® (girl scouts […]

Holly Dale

Security Operations Center Director

Holly Dale’s two decades in cybersecurity has led her to become the SOC Director at Armor. Prior to Armor, Holly held positions contracted to Oncor Energy and National Nuclear Security Administration under the Department of Energy (NNSA/DOE), including Information System Security Officer (ISSO) cyber security Subject Matter Expert (SME), Senior Security Analyst, Sr. Forensic Investigator, and Sr. Incident Responder. Holly was a founding member of NNSA's Information Assurance Response Center (IARC), as well as a member of the Secret Services's Las Vegas Electronic Crimes Task Force (LV-ECTF) and the FBI-led Nevada Cyber Crimes Task Force (NCCTF), working with numerous city, county, state and federal agencies in each task force.

Events

Oct 102017

Strategic IT Security Meeting

Kim Ross Image

Kim Ross

Jul 112017

Time’s Up: The President’s Cyber Security Executive Order is Being Enforced. What’s Next?

| Head of Security

Today marks 60 days after President Trump issued an executive order that called for government agencies to have conducted security reviews with accompanying recommendations as to what steps will be taken to secure the country’s critical infrastructure, networks and data. It seems clear that the President has good intentions with this aggressive stance. As a […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

Mar 142017

Data Classification and You: How to Improve Organizational Efficiencies and Security

| Head of the Threat Resistance Unit

In the era of big data and analytics, organizations are inundated with information, from business critical intellectual property, to routine employee memos. The diversity of this data makes effective management and classification essential to avoid being overwhelmed under a mountain of ones and zeroes. Data classification is a system of identifying and tagging data so […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Feb 102017

DON’T LOSE SLEEP WHEN SHOPPING FOR A CLOUD PROVIDER

Cloud oversubscription: a cloud provider metric that simplifies your purchasing decision Last weekend I was faced with the painful prospect of shopping for a mattress. It should be easy, right? I need a firm king mattress. That’s it; no other requirements. So, with a latte in my hand, I opened my laptop. Two hours later, […]

Dec 162016

Yahoo Breach Part II: More Implications for Businesses and Individuals

Wednesday’s disclosure from Yahoo regarding a breach of epic scale involving one billion user accounts is having a ripple effect across the spectrum. From individuals, whose accounts have been compromised, to the potential implications for the pending acquisition by Verizon, the incident is far-reaching and historic. While the scale of the data breach here is […]

Jul 132016

Updates from Microsoft WPC – Progress in Security but More is Needed

Tuesday’s keynote from the Microsoft Worldwide Partner Conference discussed the cost of cyberthreats and the pressing need for more security features to keep sensitive data safe. To successfully thwart today’s sophisticated attacks, there must be an orchestrated strategy to go beyond addressing security from issue to issue and attack to attack. Fixing application holes on a per case basis isn’t sustainable or practical.