Peter Thermos

Peter is Principal consultant with Palindrome Technologies where he provides consulting services to government and commercial clients in Information Security and Assurance and performs research in various areas including Next Generation Networks, Internet Multimedia Applications, Wireless and VoIP Security. Peter has been a speaker at several academic and industry conferences including SANS, Blackhat, MIS InfoSec and IEEE. He has published articles in trade magazines such as Information Security, ZDNET, Forbes, Tech Target, Wired and industry journals such as IEEE, ACM and IEC. Peter holds a Masters degree in Computer Science from Columbia University, and he is an active member of IETF, ACM and ISSA. He can be reached at peter.thermos@palindrometech.com.

How to Heal the FUD Associated with VOIP Security

When Ari Takanen and I wrote our book, "Securing VOIP Networks: Threats, Vulnerabilities and Countermeasures," one of our main objectives was to encourage the reader to view the approach...

Latest Posts

ForgeRock Intelligent Access Trees Simplifies Access Management

Recently, identity and access management (IAM) provider ForgeRock rolled out the latest version of its identity orchestration capability, called Intelligent Access Trees. For years, Trees have...

H20.ai’s Prashant Natarajan on AI and Computer Vision

I spoke with Prashant Natarajan, VP of Strategy & Products at H2O.ai, about the development and potential of the computer vision sector, including the...

Leading Enterprise IT Vendors 2022

Enterprise IT is a thriving market, remarkably so. All of its various sectors, from software to services to hardware, are growing rapidly. To spotlight...

AI vs. ML: Artificial Intelligence and Machine Learning Overview

The idea that machines can replicate or even exceed human thinking has served as the inspiration for advanced computing frameworks – and is now...

Zscaler Uses Integrated Platform to Combat Ransomware

Ransomware is on the rise and it’s coming from multiple sources. Additionally, whether the goal is to collect ransom for data or disrupt a...