Global Demand for AppGuard's Zero Trust Endpoint Protection Fuels Expansion of Partnership Program

Global Demand for AppGuard's Zero Trust Endpoint Protection Fuels Expansion of Partnership Program

As demand for AppGuard's zero trust endpoint protection technology grows, a new suite of clients, resellers, and partners continue to sign agreements with AppGuard.

Forbes Interviews Mark Kelton on the Threats AppGuard & Trustica Address

Forbes Interviews Mark Kelton on the Threats AppGuard & Trustica Address

SPECIAL TALK
ON THE EDGE OF CYBER ATTACK CRISIS
From Cold War to Cyber War, An Interview with Former CIA Executive Mark Kelton

A witness who has seen the backside of world history
'Geronimo EKIA.’ That was the message that US President Barack Obama was waiting to hear. On
May 2, 2011, in the White House Situation Room, Obama and his advisers had been watching a live
video from Pakistan. The US Navy SEALS were in a top secret operation in Abbottabad, Pakistan and the live video kept the White House posted on every move.

FOX News - Former CIA cybersecurity officer calls out tech companies for making insecure devices

FOX News - Former CIA cybersecurity officer calls out tech companies for making insecure devices

Former chief information security officer for the Central Intelligence Agency and current advisory board member of AppGuard is blasting tech companies – like Microsoft – for making insecure computers and selling them to consumers.

Are developers retiring faster than the programming languages they use?

Are developers retiring faster than the programming languages they use?

Somewhere there is a graveyard for dead programming languages with tombstones marked "</fortran>."

Every technology has a predictable life cycle, and when one language reaches the end of its modern usability, an alternative needs to step in. However, even retired programming languages still exist in the decades beyond their anticipated expiration as a foundation or teaching tool for other languages.

Are trusted devices becoming obsolete?

Are trusted devices becoming obsolete?

In a world where devices can have inherent security flaws, how do we make authentication safer?

Traditional cybersecurity measures are being re-examined as new technology, such as internet of things (IoT) devices, creates a larger attack surface and cybercrime incidents become more sophisticated, innovative and damaging.

The Cyber Attacks NOT Making Headlines Are The Scary Ones

The Cyber Attacks NOT Making Headlines Are The Scary Ones

Great authors don’t reveal too much of the villains, monsters, or evil entities in their work. They learned long ago that the audience is almost always disappointed when they try. As CEO of a cybersecurity vendor with products and services defending government, corporate, and consumer computers all over the world, my colleagues and myself are frequently asked ‘what were last year’s scariest cyber attacks’. 

Cyber Criminals Love the 'Detect and React' Cyber Security Approach

Cyber Criminals Love the 'Detect and React' Cyber Security Approach

Gift buying and traveling, especially during the winter holidays, creates an environment ripe for cybercrime. During this frenzied period, retailers and hospitality providers must keep their revenue generating systems up and running to keep moving product, charming customers, and making lasting holiday impressions. However, an alarming Cisco survey found that a typical enterprise of any industry is staffed only with enough security analysts to act upon half of its cyber alerts.  This could be because many companies believe in a 'detect and react' approach. Unfortunately, cyber criminals can easily take advantage of this lack of security.