Bylines and Blog Posts:

Byline: Security Sales & Integration - May 24, 2016
What To Examine When Considering Cyber Insurance

Byline:
Business Solutions - October 10, 2016
6 Steps to Prevent Hackers From Attacking Your Systems’ Biggest Vulnerability

Blog Post: NTT Com Security Blog - March 28, 2016
Don't Blame Users For Fraud, Blame the System

Blog Post: NTT Com Security Blog - March 21, 2016
Apple vs. The FBI, What It Means To You - Part 3

Blog Post: NTT Com Security Blog - March 20, 2016
Apple vs. The FBI, What It Means To You - Part 2

Blog Post:
NTT Com Security Blog - March 19, 2016
Apple vs. The FBI, What It Means To You - Part 1

Blog Post: NTT Com Security Blog - March 14, 2016
Staminus hack shows the importance of security basics

Blog Post:
NTT Com Security Blog - March 10, 2016
Incident Response Lessons from the IRS, Target, and Symantec

Blog Post: NTT Com Security Blog - February 26, 2016
A power grid hack has finally happened. Now what?

Blog Post: NTT Com Security Blog - February 25, 2016
The State of Modern Password Cracking: RSA Presentation Preview

Blog Post: NTT Com Security Blog - February 3, 2016
Email security lessons from Hillary Clinton, Sarah Palin, and the director of the CIA

Blog Post: NTT Com Security Blog - January 28, 2016
NSA hacking unit head tells us what we already knew about defending network

Blog Post: NTT Com Security Blog - January 28, 2016
Windows flaws show hazards of over-reliance on vulnerability scans

Byline: Security Info Watch - January 28, 2016
Closing and sealing network back doors to hackers

Blog Post: NTT Com Security Blog - January 26, 2016
Read the fine print on cyber insurance

Byline: Source Security - December 21, 2015
Cybersecurity And Risk Management To Gain Traction In Security Market During 2016

Byline: Business Solutions - December 8, 2015
Implementing Cybersecurity: 5 Keys To Success

Byline: Information Age - December 4, 2015 - With Stuart Reed, Kai Grunwitz, and Garry Sidaway
11 trends that will dominate cyber security in 2016

Byline: Help Net Security - April 2, 2015
How vulnerable is our critical national infrastructure?

Byline: Network World - September 23, 2014
Three critical changes to PCI DSS 3.0 that every merchant should know

Byline: Wall Street and Technology - September 18, 2014
Chip & Pain, EMV Will Not Solve Payment Card Fraud

Byline: Wall Street and Technology - August 20, 2014
Driving Information Security, From Silicon Valley to Detroit

Byline: Wall Street and Technology - July 14, 2014
Vigilante Justice on the Digital Frontier

Byline: Wall Street and Technology - June 24, 2014
Bank Fraud: It’s Not Personal, Just Business

Byline: Wall Street and Technology - May 19, 2014
Beyond Heartbleed: 5 Basic Rules To Reduce Risk

Byline: USA Today - January 9, 2014
The corporate key to agility -- and cybersecurity

Byline: CSO Magazine - September 11, 2013
A real-world approach to risk-based security planning

Byline: Secure Computing Magazine - September 3, 2013
Biting the silver bullet: Protecting corporate assets