Remove 2015 Remove Applications Remove Information Security Remove Programming
article thumbnail

Tech Moves: F5 adds CTO and HR chief; Adaptive names CFO; Techstars Seattle leaders depart

GeekWire

F5 Photos) — Seattle-based application security and delivery giant F5 announced two new executive appointments this week: Lyra Schramm , the company’s new chief people officer, and Kunal Anand , chief technology officer. Piskel joined the Seattle-based biotech company in 2015 and was most recently principal accounting officer.

article thumbnail

MACH37 Cyber Accelerator (@MACH37Cyber) Launches 17 New Cyber Security Startups

CTOvision

Pete Jobse, CIT President and CEO and MACH37™ Executive Chairman, said, “MACH37 has created a unique public-private program that brings together domain experts, successful cybersecurity entrepreneurs, and investors familiar to the security market to create a platform that enables next generation technology to be deployed more rapidly.

Security 289
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dunkin Donuts Forced to 'Fill Security Holes' in Data Breach Settlement

SecureWorld News

But the holes in the company's cybersecurity program are expensive. Now the company is being forced to take certain information security measures and pay a $650,000 fine to the state of New York. Dunkin's donut holes are delicious. Dunkin' Donuts cybersecurity lawsuit details.

article thumbnail

Spotlight on Cybersecurity Leaders: Kip Boyle

SecureWorld News

Kip Boyle is the virtual Chief Information Security Officer (vCISO) for several companies. He's served as a captain with the F-22 program in the U.S. I founded it in 2015 after realizing I could have a much bigger impact as a CISO for multiple companies instead of just one.

article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Jackson 2015 ) Follow me at [link].'

Sports 70
article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Jackson 2015 ) Follow me at [link]. Vendors are also stepping up.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Jackson 2015 ) Follow me at [link]. Vendors are also stepping up.