Peter Thermos

Peter is Principal consultant with Palindrome Technologies where he provides consulting services to government and commercial clients in Information Security and Assurance and performs research in various areas including Next Generation Networks, Internet Multimedia Applications, Wireless and VoIP Security. Peter has been a speaker at several academic and industry conferences including SANS, Blackhat, MIS InfoSec and IEEE. He has published articles in trade magazines such as Information Security, ZDNET, Forbes, Tech Target, Wired and industry journals such as IEEE, ACM and IEC. Peter holds a Masters degree in Computer Science from Columbia University, and he is an active member of IETF, ACM and ISSA. He can be reached at [email protected]

How to Heal the FUD Associated with VOIP Security

When Ari Takanen and I wrote our book, "Securing VOIP Networks: Threats, Vulnerabilities and Countermeasures," one of our main objectives was to encourage the reader to view the approach...

Latest Posts

How CIOs Measure Themselves and Why it Matters

Over the last several years, I have asked CIOs multiple times about how they would like their performance to be measured. One answer has...

Why Cloud Means Cloud-Native

“Only when the tide goes out do you discover who's been swimming naked.” -- Warren Buffett The most important change in computing over the past...

Top Cloud Service Providers & Companies

Cloud computing providers play a foundational role for businesses. Virtually every enterprise uses cloud computing in some manner, whether it’s to deliver key infrastructure...

The Role of Data Governance in Effective Data Management

I spoke with four industry experts about the growing challenges in data governance, spotlighting which issues need to be resolved for better data management. The...

Edge Data Fabric: What It Is, Why It Matters

To generate richer and more timely insights, enterprises are using increasing amounts of data. Expect that trend to continue. An IDC model projects that...