cloud services

cloud services

May 142019

Moving Sucks: 5 Tips for Painless Cloud Migration

| VP of Product

Thinking about moving to the cloud? You’re not alone. By 2022, according to Gartner, the cloud will reach the dominance phase of the digital disruption scale—that is, adoption by most enterprises. The cloud will affect not only technology but whole industries, business, and society itself. That transformation has already started. RightScale’s State of the Cloud […]

Ryan Smith

VP of Product

With 10 years of experience, Ryan Smith serves as VP of Product at Armor; he is passionate about telling stories about how companies are achieving security and compliance in the cloud. Ryan regularly speaks nationwide at conferences, user groups, and special events on the topics of cloud security, compliance – PCI, HIPAA, and GDPR, and developing secure cloud architectures. Previously, he served as Director of Product Marketing and Sr. Product Manager focused on bringing Armor Anywhere (a managed, scalable security solution that protect virtual machine instances hosted on public, private, hybrid or on-premise cloud environments) and its future iterations to market; he also has been an integral part of developing Armor’s compliance matrix mappings and the industry defining cloud adoption framework for HIPAA compliance. At prior companies, he served as the Founder, Head of Product or Marketing Manager for various SaaS businesses. Ryan holds a PhD in Mass Media and Communication Studies from European Graduate School.

Sep 202018

Diving Deeper: Phishing & BEC Scams

| Head of the Threat Resistance Unit

We continue with our ‘Diving Deeper’ series by discussing attack vectors that take advantage of human gullibility through what is arguably the most widely used business application on the Internet – email. We start by going through a brief history and introduction of phishing, spear phishing, and BEC scams; talk about how they are impacting […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).


May 222018

Amazon Web Services Chicago Meetup

Rachel Chism Image

Rachel Chism

Dec 122017

S.O.S. – Advice for Combating Shiny Object Syndrome, Part 2

| Chief Information Security Officer

In the first part of this blog series, we discussed what Shiny Object Syndrome is, how it comes to be and what effect it can have on your organization’s information security program. This blog provides more detail about how organizations can combat S.O.S. at the foundational security practice level by focusing on: network segmentation, access […]

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.


Oct 102017

Strategic IT Security Meeting

Kim Ross Image

Kim Ross

Jan 32017

Cyber Security in 2017: What Should We Expect?

Originally featured on This time of year brings a slew of “predictions” from security-minded experts. While this is a format that most have come to expect, with clear indications of storms brewing on a number of fronts, I thought I’d adapt to terminology that better describes what lies ahead  – a “forecast.” The desire […]

Dec 162016

Yahoo Breach Part II: More Implications for Businesses and Individuals

Wednesday’s disclosure from Yahoo regarding a breach of epic scale involving one billion user accounts is having a ripple effect across the spectrum. From individuals, whose accounts have been compromised, to the potential implications for the pending acquisition by Verizon, the incident is far-reaching and historic. While the scale of the data breach here is […]

Nov 282016

When Shared Cloud Security Responsibility Means Shared Confusion

With all of the advantages cloud providers offer – convenience, flexibility, ROI – it’s often difficult to resist. Indeed, the benefits are so alluring that corporate managers often buy into security pitches that promise more than can be delivered. This problem is aggravated by two facts: Cloud services are often purchased by line-of-business (LOB) managers […]

Jul 132016

Updates from Microsoft WPC – Progress in Security but More is Needed

Tuesday’s keynote from the Microsoft Worldwide Partner Conference discussed the cost of cyberthreats and the pressing need for more security features to keep sensitive data safe. To successfully thwart today’s sophisticated attacks, there must be an orchestrated strategy to go beyond addressing security from issue to issue and attack to attack. Fixing application holes on a per case basis isn’t sustainable or practical.