Jeremy Poteet

Hacker Log: Pathway to Successful Site Attack

A few fairly simple practices would have prevented my successful attack on eWEEKs OpenHack site. The bottom line is that application security can be attained, but it must be...

Latest Posts

Palo Alto Networks Shifts Zero Trust To Application Layer

Palo Alto Networks has announced what it calls Zero Trust Network Access (ZTNA) 2.0, which shifts the focus of ZTNA from the network to...

Airiam’s Art Ocain on Preventing Fraud in the SME Market

I spoke with Art Ocain, VP of Cybersecurity and Incident Response at Airiam, about why small and mid-size enterprises are more prone to cyberattack...

Lenovo Expands SSG Offerings with PCCW Solutions Acquisition

Strategic relationships are commonplace in the tech industry and typically enable the vendors involved to better serve shared customers and markets. But a few...

Komprise’s Krishna Subramanian on Managing Unstructured Data

I spoke with Krishna Subramanian, President and COO of Komprise, about best practices in managing unstructured data, a data type that many companies are...

Software AG CEO Sanjay Brahmawar on the Truly Connected Enterprise

I spoke with Sanjay Brahmawar, CEO of Software AG, about how connecting people, processes and technology enables a company to become a truly connected...