Over twenty years of progressive Information Technology leadership experience encompassing a significant depth of professional services, systems development and technology management. Result oriented management style, capable of building and motivating teams with a profound sense of urgency towards realizing a shared corporate vision and mission. Quality focused and passionate in pursuit of excellence.
Secure Self-Service Network Solutions
Business Continuity
Information Security
Major Cyber Security Projects
Cyber Security Expert affiliations
What are Cyber Security Threats? Cybersecurity threats are acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems. Common categories of cyber threats include malware, social engineering, man in the middle (MitM) attacks, denial of service (DoS), and injection attacks—we…
What is Proactive Threat Hunting? Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses. After sneaking in, an attacker can…
An internal threat refers to the risk of somebody from the inside of a company who could exploit a system in a way to cause damage or steal data. These kinds of threats are particularly troubling, as employees are expected to be trusted individuals that are granted extended privileges, which…
One of the biggest risks to an organization’s information security is often not a weakness in the technology control environment. Rather it is the action or inaction by employees and other personnel that can lead to security incidents—for example, through disclosure of information that could be used in a social…
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few…
Many organizations have been leveraging cloud-based technologies for agility, flexibility, and scalability advantages. Given this context, cloud security is indispensable for all organizations. By implementing cloud security correctly, organizations can ensure business continuity and unlock many opportunities that the cloud environment offers. What is Cloud Security? Definition Cloud security is…
Duis aute irure dolor in reprehenderit in voluptate velse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cuptat non proident, sunt in culpa qui fficia deserunt mollit anim id est laborum perspiciatis unde omnis iste natus error sit voluptatem accusantium.
Consectetur adipiscing elit, sed do eiuod tempor incididunt ut laboreet.
1 seat
1 active project
Limited blocks
Conditions
CSV export
Password protection
Consectetur adipiscing elit, sed do eiuod tempor incididunt ut laboreet.
1 seat
1 active project
Limited blocks
Conditions
CSV export
Password protection
Consectetur adipiscing elit, sed do eiuod tempor incididunt ut laboreet.
1 seat
1 active project
Limited blocks
Conditions
CSV export
Password protection
Security Analytics
Security Analytics
Security Analytics
Security Analytics
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim.
Gnu Proxy is a web frontend for the famous Postfix Mail Delivery System, written in Python (Flask micro-framework) used for building a secure SMTP Proxy server that acts as a gateway between your mail server and the internet providing varying levels of functionality, high security, depending on your use case,…
Αποτελεί κοινή άποψη ότι οι σύγχρονες επιχειρήσεις προσπαθούν να αποκτήσουν ένα σημαντικό ανταγωνιστικό πλεονέκτημα αξιοποιώντας την αποθήκευση της ψηφιακής πληροφορίας στο Cloud. Τα οφέλη από την ταχεία ανάπτυξη, την ευελιξία, το χαμηλό αρχικό κόστος και την επεκτασιμότητα, έχουν καταστήσει το Cloud Computing σχεδόν καθολικό μεταξύ των οργανισμών όλων των μεγεθών,…
SIEM Definition The SIEM acronym stands for security information and event management, a type of cybersecurity solution that collects and converges data from different parts of your IT environment for the intent of security monitoring. SIEMs refer to centralized log management tools that integrate with your different applications, systems, servers,…