How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

If you’ve ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers’ behavioral patterns.

The post How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud appeared first on Security Intelligence.

Continue reading How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

When he’s not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.

The post How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data appeared first on Security Intelligence.

Continue reading How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

Dimitry Snezhkov didn’t touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.

The post How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing appeared first on Security Intelligence.

Continue reading How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

Just three years ago Ben Goodrich graduated with a degree in physics. Today he’s a security consultant working with the world’s biggest companies to provide an injection of cybersecurity expertise.

The post How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity appeared first on Security Intelligence.

Continue reading How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks

In addition to targeted attacks, organizations in the financial services industry also face the threat of systemic financial cyberattacks. But are companies prepared for this type of threat?

The post Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks appeared first on Security Intelligence.

Continue reading Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks

Why Limor Golan Works Hard to Make Security Operations Easier

Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.

The post Why Limor Golan Works Hard to Make Security Operations Easier appeared first on Security Intelligence.

Continue reading Why Limor Golan Works Hard to Make Security Operations Easier

Visit the Subway System of Cybercrime With Security Consultant Francisco Galian

The battle stories Francisco Galian heard as a student inspired him to protect multinational networks as a security consultant. He’s parachuted in when times get critical for IBM Security customers.

The post Visit the Subway System of Cybercrime With Security Consultant Francisco Galian appeared first on Security Intelligence.

Continue reading Visit the Subway System of Cybercrime With Security Consultant Francisco Galian

How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS

X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.

The post How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS appeared first on Security Intelligence.

Continue reading How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS

How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Shir Levin used to report on government and law, but her journalism career wasn’t data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.

The post How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud appeared first on Security Intelligence.

Continue reading How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Listen to the Music of Technology With Integration Engineer Tone Johnson

As an integration engineer for IBM X-Force and a former music producer, Anthony “Tone” Johnson has learned to embrace his creative side when approaching technical challenges.

The post Listen to the Music of Technology With Integration Engineer Tone Johnson appeared first on Security Intelligence.

Continue reading Listen to the Music of Technology With Integration Engineer Tone Johnson