eWeek: “HOPZERO and ‘Mission Impossible’ – Where Data Self-Destructs”
It’s not often you find out your company has something in common with the classic show, Mission: Impossible.
But that’s just what happened to us recently when HOPZERO was profiled by Chris Preimesberger in eWeek, a trusted periodical of the IT industry.
How exactly is HOPZERO similar to that classic late 60s, cold-war show? You’ll have to click on the link below to find out.
Or better put…
“Your mission, should you choose to accept it, is to find out how HOPZERO’s approach is like a Mission: Impossible message…”
And though this blog post won’t self-destruct anytime soon, we still hope you’ll check out this timely article.
If you’re involved in IT, you’ve probably heard of HOPs. But you might have asked yourself: What does HOP count mean? And why should you care?
While it’s nearly impossible to predict the future, here are four key cyber security trends for 2020 we think every infosec professional should keep tabs on.
Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise?...
Enterprise Management Associates (EMA) is a leading voice in the information security industry. With its dedication to in-depth research — and unrivaled analysis — the EMA is an important resource for data management and IT professionals...
Chinese Army purportedly inserted chips to provide hackers a connection into the back-end infrastructure where they can steal information and credentials.
Bill Alderson is CEO and co-founder of HOPZERO. He has been involved with network security since 1980, where he began analyzing secure networks for Lockheed. Formerly Technology Officer of NetQoS/CA Technologies, he is a deep packet analyst, and was an integral member of the 9/11 Pentagon restoral team. Alderson has trained over 50,000 network forensic professionals through his Certified NetAnalyst program, and has assisted 75 Fortune 100 companies with network security needs. He was deployed six times with US Central Command to Iraq and Afghanistan to provide deep packet analysis for large-scale network Department of Defense biometric network systems.