In The News

Praetorian Prefect Authors – In the News

SC Magazine
A look ahead
December 3, 2012

Gal Shpantzer takes on infosec’s ‘cool kids’
October 16, 2012

WLAN, UC and MDM Top Index of IT Networking Budget
September 14, 2012

Network World
Aging hardware drives core router and switch upgrades
September 12, 2012

SC Magazine
An abusive relationship
March 01, 2012
Application security not a top priority for UK organisations
February 08, 2012
Fewer than a third of UK organizations plan mobile security projects
February 01, 2012

Computerworld Australia
New leaders emerging in WAN optimization market
January 28, 2012
Data protection tops UK security investments in 2012
January 27, 2012

Network World
WAN optimization market shakeup predicted
January 19, 2012

SC Magazine
Over the horizon: Predictions for 2012
December 01, 2011

Network World
Cisco, Juniper, Check Point, Palo Alto among firms in security contest
November 29, 2011

Spending on information security outpacing other corporate IT
November 18th, 2011

Information Week
2012 Security Spending To Hold Strong
November 17, 2011

Yahoo Finance
Spending on Information Security Continues to Outpace the Rest of Corporate IT According to Latest Bi-Annual Study of the Global 2000
November 17, 2011

McAfee Blog Central
October #SecChat Recap: Physical & Virtual Security for the Next-Generation Data Center
November 2, 2011

CSO Online
They are the 11 percent (or less) who really get security
November 01, 2011

CSO Online
Laggard to leader: What it takes to get there
October 05, 2011

McAfee Blog Central
July #SecChat Recap – Security Conferences
August 11, 2011

Log management and network auditing led to AT&T insider’s arrest
July 26, 2011

McAfee Blog Central
#SecChat Wrap-Up: Application Security
March 30, 2011

McAfee Blog Central
#SecChat Highlights – Threats and Cyber Espionage
March 8, 2011
Incident response lessons from the Gawker Media breach
January 7, 2011

Tech Herald
Do you use any of these passwords? Change them if you do.
December 16, 2010

New York Magazine
The Aftermath of the Gawker Hack
December 13, 2010

Washington Post
My Gawker account got compromised. Now what?
December 13, 2010

The Atlantic
Why Gawker’s Security Breach Is So Bad
December 13, 2010

Internet Evolution
Baidu Lawsuit Could Set Registrar Precedent
July 30, 2010

Twitter XSS Vulnerability Possibly Exploited by Turkish Hackers
June 28th, 2010

The New York Times
Federal Officials Continue AT&T iPad Investigation
June 17, 2010

Dark Reading
FBI Investigating Breach Of iPad Customer Email Addresses On AT&T Website
June 11, 2010

AT&T Could Have Avoided iPad E-mail Breach, Experts Say
June 10, 2010

What the AT&T breach means for iPad users (FAQ)
June 10, 2010

Network World
Talking with a Forbes blogger about firewalls
May 31, 2010

Network World
The firewall: Interview with blogger Daniel Kennedy
May 26, 2010

Dark Reading
New HTML Version Comes With Security Risks Of Its Own
May 11, 2010

Business Standard
India not ready for cyberwar
February 04, 2010

infosecurity Magazine
US House websites hacked after state of the union
February 01, 2010

SC Magazine
Hackers deface 49 U.S. House websites
January 28, 2010

House CAO probes hacker attack
January 28, 2010

TechCrunch Hacked and Defaced
January 26th, 2010

Dark Reading
Google Hack Code Released, Metasploit Exploit Now Available
January 16, 2010

Baidu Hacked from Domain Registrar, Researcher Says
January 12, 2010

ComputerWorld probably attacked from U.S. domain registrar, says researcher
January 12, 2010

Iranian Cyber Army Takes Over Baidu
January 12th, 2010

Network World
Juniper patches router-crashing bug
January 07, 2010

Juniper Warns of Critical Vulnerability in Its Routers
January 07, 2010

Dark Reading
Critical Juniper Router Flaw Triggers Prompt Patching
January 07, 2010

The Register
Easily spoofed traffic can crash routers, Juniper warns
January 07, 2010

Dark Reading
Intel Website Hacked With SQL Injection
December 23, 2009

Network World
Hackers hit OpenX ad server in Adobe attack
December 23, 2009

TechTarget e-Book
Email Retention: Standards and Practices

Dark Reading
Hacker Exposes Unfixed Security Flaws In Pentagon Website
December 08, 2009

60 Minutes covers cybersecurity threats, federal data breach
November 09, 2009