This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software Last month at Gartner Symposium in Orlando, Fla., By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software Last month at Gartner Symposium in Orlando, Fla.,
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software. In December 2021, Broadcom Software published our blog: Predictions for 2022. To learn more on how Broadcom Software can help you modernize, optimize and protect your enterprise, contact us here.
” “The suppliers will provide a centralized way for government agencies to procure hardware, software and consulting services for continuous monitoring and real-time threat detection.” ” Symantec believes that they have found at least 1200 malicious apps in the last seven months. Via Net Security, more here.
By Tom Thorpe, Vice President International Markets, Broadcom Software. It’s been great to see people returning to face-to-face meetings in recent months – for us at Broadcom Software, a little more than most. Talk about timing: just as we completed the acquisition of Symantec in November 2019, a global pandemic hit.
Amit Mital , a longtime Microsoft leader and former CTO of Symantec, is Juicers chief operating officer and co-founder. Juicer CTO Goutham Sukumar , also a co-founder, was CEO of email security startup NitroDesk, which was acquired by Symantec in 2014. Juicer has less than 10 employees.
DeepSurface co-founders Tim Morgan, CTO, left, and James Dirksen, CEO. Founded in 2017, DeepSurface was led by CEO James Dirksen , who previously sold RuleSpace to Symantec and was an executive at Formaltech, and CTO Tim Morgan , a longtime security consultant. based company that helps customers evaluate security risks.
Its offerings include its Reveal(x), a software-as-a-service security platform. The company also announced Tuesday that Marc Andrews is taking the role of chief revenue officer. He previously led global sales at cybersecurity companies Symantec and Blue Coat Systems.
DeepSurface Security co-founders Tim Morgan, CTO, and James Dirksen, CEO. Led by security industry veterans, the 3-year-old startup sells software that assesses potential risk and lays out a “hacker roadmap.” DeepSurface Photos). Portland, Ore.-based It will sell to the general public later this year.
Swift is a longtime Seattle-area gaming industry vet whose resume includes Valve Software (she helped lead development of Portal), Airtight Games, Amazon, EA, and most recently Google Stadia, where she was a game design director for the tech giant’s cloud gaming service. He previously worked at Nike, Symantec and The Regence Group.
Karat helps software engineering teams with the first round of technical interviews. Collin Davis , who previously founded Alexa For Business at Amazon, was appointed as CTO of Pindrop, a voice security service. He previously was a vice president of endpoint protection and director of engineering at Symantec.
Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. CTO cyber conflict cyberattack Cybersecurity'
As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here). The reality is that antivirus software that uses old fashioned methods of signature analysi. To read more please log in.
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software. Last December, Broadcom Software published our blog: Predictions for 2022. Contact Broadcom Software now to see how we can help you achieve Zero Trust at scale. First up, Zero Trust.
based Dutch Bros Coffee as the retailer’s first chieftechnologyofficer. At Blue Nile, a Seattle-based online jewelry retailer, Gower was VP of technology. She was previously senior director of technology and product at T-Mobile and a consultant at Slalom Consulting. and Sanofi Pasteur. Leigh Gower.
Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such. The chorus of voices declaring the end of anti-virus has reached a deafening pitch.
All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. The Symantec Government Symposium features 10 sessions where attendees will: Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content