All Newsroom

Press Coverage
Top Must-Know Network Security Tricks

Technopedia | November 30, 2015


Locking down your network? Technopedia collaborates with industry cyber security experts, including Armor CSO Jeff Schilling, on best practices for keeping your infrastructure safe from attacks and other malicious behavior.

It’s no shock that 2015 represented one of the most shocking years for high-profile data breaches. And many cyber security experts are expecting more of the same for 2016. ThirdCertainty, an independent news organization that focuses on privacy and security risks, asked the world’s top cyber security experts on what to expect during the next 12 months.

Armor CSO Jeff Schilling believes that threat actors will focus more and more on big data aggregation, but then move on to a new attack vector: physical penetration.

Press Coverage
Companies are starting to hire many more hackers

CNBC | November 19, 2015


It’s conventional wisdom among cybersecurity experts that both the U.S. government and many industries have underinvested in cyber security, even as the number and scale of threats have visibly grown. But now that appears to be changing, as many institutions are now ramping up hiring, and the next generation of cybersoldiers is stepping up. Armor CSO Jeff Schilling has cautioned for years that the world was grossly short of properly trained cyber security professionals.

Press Coverage
9 tips for staying safe as you shop online

USA Today | November 19, 2015

USA Today

Each winter, shoppers flock to online stores to fill holiday wish lists and avoid crowded stores. While holiday tips seem like a cliche topic, threat actors are always evolving their tactics to increase their chances for success. To keep abreast of the latest threats, USA Today polled security vendors for nine tips for staying safe this shopping season. Armor CSO Jeff Schilling advised consumers to be very cautious of locking their mobile devices.

Today’s CISO faces new challenges for managing security services. From new threats, complex compliance requirements, investor pressure and market competition, CISOs are tasked with an almost impossible balancing act. As such, many are outsourcing security services to expert vendors. Armor CISO Kurt Hagerman offers guidance to the B2B News Network on why it’s critical for organizations to match the right technology, personnel, process and third-party vendors.

The Tor Project claimed it learned more about an attack on its Deep Web hidden service subsystem that was detected in July 2014. The Tor Project said that the Carnegie Mellon researchers responsible for the attempt to hack Tor’s network were hired by the FBI. Dr. Chase Cunningham, Armor’s head of threat research and development, weighed in on the Tor Project’s claims. Was it just so Carnegie Mellon researchers could say they did it?

In a special Veterans Day feature, CSO writer Steve Ragan profiles six veterans who have transitioned into successful careers in information security. Core to his story, Armor CSO Jeff Schilling — a retired U.S. Army Colonel — discusses his transition into cyber security, adjustments between active duty and civilian roles, and advice he’d give other veterans seeking similar career paths.

Lack of commitment to cyber security budgets is a key reason many organizations are failing to keep pace with what’s required to properly defend data in today’s threat landscape. Armor CSO Jeff Schilling further explains that the healthcare industry is one of the least prepared to defend ePHI and other sensitive data. To date, their focus has been on patient care — and that should be their core focus. But this introduces the challenge of healthcare organizations attempting to protect some of the most critical data with extremely limited budgets.

Armor’s head of threat research and development, Dr. Chase Cunningham offers critical advice to eWeek as part of 12 tips to help users avoid becoming an easy target. Cunningham explains why it’s always smart to validate that a URL matches the site users want to visit. He later asks users to be wary of unusual or unexpected communication from friends, co-workers or neighbors. They may be unknowingly distributing malware.