infrastructure security

infrastructure security

Events

Sep 252018

PCI SSC North America Community Meeting

admin Image

admin

May 82018

Looking Back on High-Profile Cybersecurity Attacks

| Head of Security

Nearly one year ago, on May 12, 2017, WannaCry ransomware successfully compromised more than 400,000 computers and servers running Microsoft Windows. The cybersecurity attack paralyzed healthcare systems, government agencies, universities and many other industries in more than 150 countries with the total cost of damages estimated at nearly $1 billion. Several weeks later, Microsoft Windows […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

May 32018

The Good, Bad & Ugly of IoT Security

Through smart integrations of electronics, sensors and connectivity, the internet of things (IoT) has enabled us to automate an increasing number of day-to-day tasks. On the flip side, it’s also bringing in new threats. In fact, it didn’t take much time for IoT devices to be responsible for some of the largest DDoS attacks in […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Apr 172018

Enough with the Cybersecurity Talent Shortage

| Head of Security

Everyone, including us, continues to harp about the cybersecurity talent gap. But while we recognize the problem, no one ever offers advice or recommendations on how key organizations, such as educational institutions, security groups and private companies, can help mend it and begin producing educated, experienced workers in troves. The cybersecurity talent gap in numbers […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

Dec 52017

S.O.S. – Why Shiny Object Syndrome Is the Enemy of Security, Part 1

| Chief Information Security Officer

What is Shiny Object Syndrome and What Does It Have to Do with Information Security? There are many descriptions for S.O.S. out there, but the following may be the most concise I’ve seen: “Shiny Object Syndrome (Objectivius Shinium Syndromus) is defined as the attraction to objects that exhibit a glassy, polished, gleaming or otherwise shiny […]

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Events

Nov 272017

AWS re:Invent

Kim Ross Image

Kim Ross

Oct 312017

Who’s Haunting Your Network?

Disappearing files, phantom administrators, suspicious logs. Unless you’re the suspicious type, you might have written these off as non-critical issues without any nefarious source. But what if there’s a maliciousness behind this madness? What if there are ghosts in your business machines?

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Events

Jul 52017

PCI London

admin Image

admin

Jun 282017

Petya: Using Blast Radius to Deduce Attribution

As the global ransomware attack coined Petya continues to proliferate globally, identifying the culprits is an important piece of the puzzle. At this point, it’s prudent to attempt to rule out who it doesn’t appear to be through process of elimination. While there was clear forensic evidence connecting the code used by the WannaCry actors […]

Apr 252017

Facing The Shadow Brokers (TSB) Exploit Dump – Best practices to help protect IT infrastructure

Christmas has come early for hackers around the world as they pour through the treasure trove of previously unseen exploits released by The Shadow Brokers (TSB). The tools were reportedly developed and utilized by the National Security Agency and are currently permeating underground criminal online forums. While the hackers are working to reverse engineer and […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.