John Pescatore

Type: Person
Name: John Pescatore
First reported Oct 17 2014 - Updated Oct 18 2014 - 1 reports

White House gives agencies the lead role in combating ID theft

N ew, more secure government credit cards and multi-factor authentication for federal websites dealingwith sensitive citizen data are two ways the White House wants the government to lead a nationwide effort toreduce identity theft and fraud.President ... [Published Federal News Radio 1500 AM - Oct 17 2014]
First reported Oct 16 2014 - Updated Oct 16 2014 - 1 reports

Pacific DataVision: Morgan O'Brien, John Pescatore detail potential 900 MHz transition from LMR to LTE

Morgan O'Brien (left) and John Pescatore of Pacific DataVision (PDV) outline the potential roadmap as the company seeks to transition its 900 MHz enhanced-dispatch offering from LMR to LTE during this conversation with IWCE 's  Urgent Communications Editor ... [Published Urgent Communications - Oct 16 2014]
First reported Oct 14 2014 - Updated Oct 14 2014 - 2 reports

Pacific DataVision: Morgan O'Brien, John Pescatore talk about partnership opportunities

Morgan O'Brien (left) and John Pescatore of Pacific DataVision (PDV) discuss potential partnerships their company will seek with radio-industry players during this conversation with IWCE 's Urgent Communications Editor Donny Jackson during the EWA /USMSS ... [Published Urgent Communications - Oct 14 2014]
First reported Oct 14 2014 - Updated Oct 14 2014 - 1 reports

> O’Brien: PDV Wants to Partner with Mobile Radio Businesses

By Sandra Wendelken, EditorMorgan O’Brien announced that his venture, Pacific DataVision (PDV), wants to partner with two-way mobile radio businesses at the Enterprise Wireless Alliance (EWA) Wireless Leadership Summit Oct. 9 in Denver.“We see many opportunities ... [Published Radio Resource Magazine - Oct 14 2014]
First reported Oct 09 2014 - Updated Oct 09 2014 - 1 reports

JPMorgan Hackers Said to Probe 13 Financial Firms

The hackers who raided the data banks of JPMorgan Chase & Co. (JPM) used computers now linked to possible attacks on at least 13 more financial companies, according to a person familiar with the investigation.More than a month after the JPMorgan hack ... [Published Bloomberg - Oct 09 2014]
First reported Oct 08 2014 - Updated Oct 08 2014 - 1 reports

News Scan: Cloud, IoT make cybersecurity more critical than ever; Tech reps, DHS meet on embedded security efforts; More

>>Cloud, IoT make cybersecurity more critical than everOctober is officially National Cybersecurity Awareness Month, and the importance of cybersecurity has never been more important than in the age of the cloud and the Internet of Things. That ... [Published Fierce CIO - Oct 08 2014]
First reported Oct 08 2014 - Updated Oct 08 2014 - 1 reports

Nominations Now Open for the SANS 2014 Difference Maker Awards

SANS is accepting nominations for both People Who Made a Difference in security in 2014, and for the Best Security Products and Services, as well. Submissions are due by November 3, 2014"There is no shortage of news stories spotlighting security failures. ... [Published Industrial Info Financials - Oct 08 2014]
First reported Oct 07 2014 - Updated Oct 07 2014 - 1 reports

U.S. Department of Defense considers giving private Cloud vendors access to top secret data

The U.S. government is reviewing two possible scenarios whereby private cloud suppliers and facilitators would receive access to Level 5 and 6 information workloads - the most sensitive of government data.A newly published Request For Information document ... [Published TheStack.com - Oct 07 2014]
First reported Oct 03 2014 - Updated Oct 03 2014 - 1 reports

DoD May Invite Cloud Vendors Into Govt. Data Centers

In an effort to tap commercial cloud technology without sacrificing security or control, the Department of Defense considers two potential models.5 Early Cloud Adopters In Federal Government(Click image for larger view and slideshow.)The US Department ... [Published Information Week - Oct 03 2014]
First reported Oct 02 2014 - Updated Oct 02 2014 - 1 reports

The Importance of Cybersecurity in the Age of the Cloud and Internet of Things

Cloud and mobile computing are pushing the IT landscape further away from the organization, and an emerging Internet of Things is expanding the surface area of a defensive front already riddled with holes. Any member of an organization is subject to social ... [Published Government Technology US - Oct 02 2014]
First reported Sep 29 2014 - Updated Sep 29 2014 - 2 reports

Data Breaches Rise as Cybercriminals Continue to Outwit IT

Part of the problem is that only 38 percent of companies have established a way to prioritize their security investments to focus on actual risks and the repercussions they bring."You'll often see organizations spend to secure [against] the current big ... [Published CIO IT-Strategie für Manager - Sep 29 2014]
First reported Aug 25 2014 - Updated Aug 25 2014 - 4 reports

Breach Response: Are We Doing Enough?

What lessons can be learned from recent high-profile breaches? IT security experts John Pescatore of the SANS Institute and Ron Ross of NIST explain how organizations can work to mitigate the new-style data breach threat. Listen to the conversation. ... [Published BankInfoSecurity.com - Aug 25 2014]

Quotes

"there is no shortage of news stories spotlighting security failures. as these stories continue to dominate headlines, they overshadow the many good things security professionals are doing every day to protect customer and business data from the bad guys" said John Pescatore
...are doing every day to protect customer and business data from the bad guys," said John Pescatore , Director of Emerging Trends, SANS Institute. "there are thousands of security practitioners who are quietly succeeding and making breakthroughs in advancing security. the difference makers awards were developed to honor these individuals."
...data centers also reflects the lingering concerns over loss of control that many organizations have when migrating to the cloud, Pescatore said. "it shows a certain 'server-hugger' stance that says, 'wait a minute. unless i have physical control of the data center, it will never work.'"
"you'll often see organizations spend to secure [against] the current big threat but not focus on building a sustainable security program" says John Pescatore, a director at the SANS Institute, a security training organization

More Content

All (33) | News (28) | Reports (0) | Blogs (4) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
White House gives agencies the lead role in com... [Published Federal News Radio 1500 AM - Oct 17 2014]
Pacific DataVision: Morgan O'Brien, John Pescat... [Published Urgent Communications - Oct 16 2014]
Pacific DataVision: Morgan O'Brien, John Pescat... [Published Urgent Communications - Oct 14 2014]
Pacific DataVision makes pitch for partners at ... [Published Urgent Communications - Oct 14 2014]
> O’Brien: PDV Wants to Partner with Mobile Rad... [Published Radio Resource Magazine - Oct 14 2014]
JPMorgan Hackers Said to Probe 13 Financial Firms [Published Bloomberg - Oct 09 2014]
News Scan: Cloud, IoT make cybersecurity more c... [Published Fierce CIO - Oct 08 2014]
Nominations Now Open for the SANS 2014 Differen... [Published Industrial Info Financials - Oct 08 2014]
Nominations Now Open for the SANS 2014 Differen... [Published SPi World News - Oct 08 2014]
U.S. Department of Defense considers giving pri... [Published TheStack.com - Oct 07 2014]
DoD May Invite Cloud Vendors Into Govt. Data Ce... [Published Information Week - Oct 03 2014]
The Importance of Cybersecurity in the Age of t... [Published Government Technology US - Oct 02 2014]
Data Breaches Rise as Cybercriminals Continue t... [Published CIO IT-Strategie für Manager - Sep 29 2014]
Data Breaches Rise as Cybercriminals Continue t... [Published CIO Magazine - Sep 29 2014]
Sprint sells spectrum to new push-to-talk provider [Published Total Telecom - Sep 19 2014]
Back to the Future? O’Brien notes similarities,... [Published Urgent Communications - Sep 18 2014]
AT&T Announces New Managed Security Services an... [Published Computeruser.com - Sep 16 2014]
SANS NewsBites September 9, 2014 ... [Published SANS NewsBites - Sep 10 2014]
Breach Response: Are We Doing Enough? [Published BankInfoSecurity.com - Aug 25 2014]
Breach Response: Are We Doing Enough? [Published CareersInfoSecurity.com - Aug 25 2014]
Breach Response: Are We Doing Enough? [Published HealthcareInfoSecurity.com - Aug 25 2014]
Breach Response: Are We Doing Enough? [Published GovInfoSecurity.com - Aug 25 2014]
Threat intelligence versus risk: How much cyber... [Published SearchSecurity.com - Jun 03 2014]
Verizon DBIR: Incident Noise and Attack Pattern... [Published McAfee Blogs - May 09 2014]
NSA denies exploiting Heartbleed bug to gather ... [Published Denver Post - Apr 12 2014]
NSA hackers said to have used Heartbleed bug fo... [Published Pittsburgh Tribune Review - Apr 12 2014]
The NSA Knew About Heartbleed And Did Nothing (... [Published Techdirt - Apr 11 2014]
UPDATED: NSA Denies Claims That It Knew About H... [Published Techdirt - Apr 11 2014]
The NSA Knew About Heartbleed And Did Nothing (... [Published Techdirt - Apr 11 2014]
NSA exploited Heartbleed bug for two years to g... [Published Financial Post | Business » FP Tech Desk - Apr 11 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Verizon DBIR: Incident Noise and Attack Pattern... [Published McAfee Blogs - May 09 2014]
In our Security Connected discussions, security leaders routinely ask “Where do I invest for results? How do I communicate the risk reduction impact of security investments to the Board?” Now there’s practical assistance on which controls count and why: ...
UPDATED: NSA Denies Claims That It Knew About H... [Published Techdirt - Apr 11 2014]
Update: The NSA has denied the Bloomberg report , briefly stating that the agency "was not aware of the recently identified Heartbleed vulnerability until it was made public." We'll continue to update as more information emerges. The internet ...
The NSA Knew About Heartbleed And Did Nothing (... [Published Techdirt - Apr 11 2014]
The internet is still reeling from the discovery of the Heartbleed bug, and yesterday we wondered if the NSA knew about it and for how long. Today, Bloomberg is reporting that the agency did indeed know about Heartbleed for at least the past two ...
NSA exploited Heartbleed bug for two years to g... [Published Financial Post | Business » FP Tech Desk - Apr 11 2014]
The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter ...
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.