Employee Threat Assessment Template for Large Orga... » Despite the popular image of the hacker cracking distant servers from his basement, studies show tha... Options successfully completes annual SOC 2 and S... » New York: Options has announced the successful completion of the annual Service Organization Control... Check Point launches World Cyber Threat Map, sho... » Check Point Software Technologies Ltd. has launched the ThreatCloud World Cyber Threat Map, which vi... Again, PALFINGER records huge growth with exceptio... » - Record revenue of EUR 292.3 million (+10.7 per cent) - EBIT increased by 15.5 per cent to EUR 23.... Police: Hotel death post-mortem is inconclusive » Following the death of a man at the Dorchester Hotel in central London, a post-mortem examination he... Billion Electric improves the efficiency of cros... » Billion Electric Corp. has launched the world's first 3G/4G LTE router designed to maximize producti... Social registration tool increases networking valu... » The Emergency Services Show is using the GleanIn social registration tool to harness the power of so... A10 Networks promotes world wide technology (WW... » SAN JOSE, Calif.: A10 Networks has announced that World Wide Technology (WWT), a market-leading syst... Linux and BSD web servers at risk of sophisticat... » ESET has published its in-depth technical research paper, entitled ‘Unboxing Linux/Mumblehard - Mutt... The O2 arena awards five-year event control contra... » Integrated Security Consultants (ISC) Ltd, has been awarded a five-year contract to supply CCTV and ...

CLICK HERE TO

David GibsonDavid Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, system administration, and network design.

He is currently Director of Technical Services at Varonis Systems where he oversees product marketing and positioning. As a former a technical consultant, Mr. Gibson has helped many companies design and implement enterprise network architectures, VPN solutions, enterprise security solutions, and enterprise management systems. He is a Certified Information Systems Security Professional (CISSP).