Search:

TAG: ikanow

  • chris-morgan-ikanow

    CyberWire Podcast Features IKANOW CTO Chris Morgan

    The CyberWire Daily Podcast from earlier this week featured IKANOW CTO Chris Morgan. He explained the importance of quantifying risks based on business value. Listen to the excerpt below.   For the full podcast, click here.

    READ MORE
  • Ikanow_logo_2

    IKANOW Introduces Channel Partner Program

    Partners Gain Preferential Access to Lightning Fast Information Security Analytics RESTON, VA – IKANOW, the leader in open-source information security analytics, today announced the launch of a new channel partner program for resellers, integrators, service providers and their end customers. The program, named the IKANOW Preferred Partner Program, was created to meet the rapidly increasing demand for IKANOW’s Information Security Analytics (ISA) solution among mid- to large-size enterprise customers. Partners will receive technical guidance, sales and marketing support, and financial incentives to enable them to deploy and manage IKANOW ISA…

    READ MORE
  • dcinno-profiles-ikanow

    DC Inno on IKANOW, “a startup that uses big data to crush hackers…”

    DC Inno recently interviewed IKANOW co-founders Dave Camarata and Chris Morgan for a profile story on IKANOW’s beginnings and growth. DC Inno’s Chris Bing begins, “Dave Camarata and Chris Morgan were once contracted by the U.S. military because of the powerful big data analytics software they created. The pair used their platform to predict the placement of improvised explosive devices (IED) in dangerous war zones, through their former company MTC Services Corporation (MTCSC), to keep armed forces safe. Now, Morgan and Camarata are applying a similar technology approach to understand…

    READ MORE
  • chris-morgan-ikanow

    See IKANOW CTO Chris Morgan at InfraGard Next Week

    IKANOW CTO and co-founder Chris Morgan will present at the InfraGard conference in Washington, DC on Wednesday, February 17th. The topic of his presentation: “What is the employee’s role in cybersecurity and what does that mean to the CISO?” Although 80% of cyber threats come from outside an organization, a full 20% stem from insider threats according to Verizon’s “2015 Data Breach Investigations Report.” CISOs must defend against all attacks. In the end, every attack is looking for a host and increasingly these are unaware employees or exposed laptops. The…

    READ MORE