Search Results

Results 1-6 of 6 for Chris Petersen
SPOTLIGHT ON SECURITY

Mobile Malware’s Growth Slows, Nastiness Grows

"If the bill would open up unique threat intelligence to the private sector, then it's worth doing," said Chris Petersen, founder and CTO ofLogRhythm "If the bill only allows for the private sector to share with the public sector, then it probably isn't worth doing," he told T...

SPOTLIGHT ON SECURITY

‘Comment Crew’ Back in Action Against US Cybertargets, Says Mandiant

Both Congress and President Obama have begun to move in the right direction in recent times, noted Chris Petersen, founder and CTO of LogRhythm "However, we may be running short on time," he told TechNewsWorld.

SPOTLIGHT ON SECURITY

Social Sharing May Be Eroding Office Security

Much has been made of the growing willingness of people to cough up personal information about themselves online for a variety of reasons. Those attitudes are bound to eventually affect how people treat their organization's data, according to Chris Petersen, founder and CTO of LogRhythm...

EXPERT ADVICE

Big Data and the London Olympics Cybersecurity Challenge

Security has been a top concern of the Olympic Games ever since that fateful day in September of 1972 when terrorists killed members of the Israeli Olympics team. Since then, each Olympics has only increased its level of security consideration. ...

EXPERT ADVICE

Log Management and SIEM: The Network’s Trusty Watchdogs

Managing a data center is more complicated than ever with the growing sophistication and interconnectedness of enterprise applications, networks and now private and public cloud resources. The challenges created by these interwoven infrastructures are difficult to overcome without the right tools. ...

EXPERT ADVICE

6 Critical Technologies for Combating Targeted Attacks

Hiring a professional penetration tester is often a humbling experience. Using a mix of simple social engineering and technology savvy, a professional is often able to expose dangerous security holes in an organization's IT infrastructure with ease. In a few days, a penetration tester can identify security vulnerabilities overlooked by the IT staff. ...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

Technewsworld Channels