For over 25 years, Leo has executed on strategic business vision and technical leadership with a wide range of start-ups and established cybersecurity companies in various senior leadership roles. Leo’s expertise in enterprise, cloud and SaaS security enabled him to build and lead high-performance technical teams driving product development, technical innovation, and sales for a number of companies including VMware, Lastline, Zscaler, Barracuda Networks, Forcepoint, RedSeal Networks, Fortinet, Juniper, and NetScreen.
SEO Poisoning Brings Users to Attackers’ Doors
Using black hat SEO to achieve high rankings for particular search terms, threat actors can sit back as victims flock to their malware-infected websites.
Read MoreDon’t Gamble with Your Cybersecurity
Recent cyberattacks combined stolen credentials, social engineering, MFA resets and SSO manipulation in what’s been described as the Ocean’s 11 of the cyber age.
Read MoreVulnerabilities in Enterprise Apps Earn Most-Favored Status for Cyberattacks
The recently exposed Microsoft Teams GIFShell technique demonstrates why Zero Trust protection for app surfaces is essential for even the most trusted enterprise apps.
Read MoreWeaponized Links and Attachments Being Used to Install Malware
Documents with embedded macros are increasingly being used to deliver malware. New Microsoft defaults decrease the danger, but only somewhat, and only for Office docs.
Read MoreThe Latest Scam: Soliciting Employees to Deploy Ransomware
In a new twist on email-based attacks, cybercriminals are recruiting disgruntled or greedy employees to deploy ransomware in their employers' systems, in exchange for a cut.
Read MoreZero Trust Network Access: A VPN Replacement
The time is right for most companies to make the switch to a Zero Trust-based approach as a VPN replacement for enabling remote work.
Read MoreMachine Learning in Identity and Access Management
Take a closer look at how machine learning, a subfield of artificial intelligence, is being deployed in cybersecurity for identity and access management security controls.
Read More