Kevin Bocek

Last updated on 2017-01-21T00:05+0300.

About this image

sign

Quotes... Extracted quotes from

Kevin Bocek says : "According to a Venafi survey from 2018 , once IT professionals deployed a comprehensive machine identity protection solution, they typically found 57,000 TLS machine identities that they did not know they had in their businesses and cloud," External link

betanews Wednesday, July 1, 2020 12:40:00 PM EAT

Kevin Bocek says : "Many of the cyber attacks targeting elections come from machines, which can automatically spread information and direct attacks on the systems that count votes," External link

betanews Thursday, June 11, 2020 2:06:00 PM EAT

Kevin Bocek said : "The integration of Futurex with the Venafi Trust Protection Platform is an exciting development that our mutual customers have asked for," External link

news-yahoo Tuesday, June 9, 2020 5:50:00 PM EAT

Kevin Bocek says : "Security professionals are under constant siege from very sophisticated threat actors targeting government, military and private organizations," External link

betanews Thursday, March 12, 2020 2:43:00 PM EAT

Kevin Bocek adds : "The sophisticated cyberattacks that are the hallmark of nation state attacks often target digital keys and certificates that serve as machine identities," "These critical security assets are often poorly protected and provide attackers with the ability to hide in encrypted traffic, pivot across networks and eavesdrop on sensitive data. Any organization that isn't protecting machine identities at least as well as they protect usernames and password is at greater risk of becoming a victim of a cyberattack. And, unfortunately, these risks are unlikely to change in the near term because most organizations are just beginning to understand these risks" External link

betanews Thursday, March 12, 2020 2:43:00 PM EAT

Kevin Bocek said : “To reduce security risk and improve reliability, CISO’s want faster and more comprehensive machine identity protection across the extended enterprise,” External link

4-traders Tuesday, November 26, 2019 4:33:00 PM EAT

Kevin Bocek says : “Mounting an attack requires resources and a level of effort. That then points back to a certain set of adversaries that could have completed it. So if we see, for example, the likes of Russia trying to manipulate the elections, it’s most likely that it won’t be en-masse and we’ll be targeted in places that lead to a greater outcome” External link

globalsecuritymag Thursday, November 7, 2019 9:03:00 PM EAT

Kevin Bocek concludes : “I think it’s our ability to respond and to recover now, that’s as important as preventing the breach. So for example, how can we bring back that trust and confidence as soon as possible? These are things that haven’t been worked on at all. We’re still very much in the early stages” External link

globalsecuritymag Thursday, November 7, 2019 9:03:00 PM EAT

Kevin Bocek said : “As digital transformation drives the need for DevOps, multi-cloud and microservice strategies, the number of machine identities—like TLS keys and certificates—on enterprise networks is exploding,” External link

businesswire Friday, October 25, 2019 1:17:00 AM EAT

Kevin Bocek said : “As digital transformation drives the need for DevOps, multi-cloud and microservice strategies, the number of machine identitieslike TLS keys and certificateson enterprise networks is exploding,” External link

4-traders Thursday, October 24, 2019 3:50:00 PM EAT

Kevin Bocek said : “Machine identities are extremely valuable targets for cyber criminals and large enterprises often have tens of thousands of machine identities they need to protect,” External link

computerweekly Tuesday, October 22, 2019 6:25:00 PM EAT

Kevin Bocek says : "It's clear the public is nearly as skeptical of government claims around privacy and security as they are of the same claims coming from social media companies," External link

betanews Thursday, September 26, 2019 3:05:00 PM EAT

Kevin Bocek sagte : "Als führendes Unternehmen für den Schutz von Maschinenidentitäten begrüßt Venafi die Herausgabe der neuen Kapazitäten von nShield as a Service durch nCipher Security" External link

finanznachrichten-en Wednesday, September 18, 2019 9:42:00 PM EAT

Kevin Bocek disse : "Como líder em proteção de identidade de máquina, a Venafi está contente com o lançamento do novo nShield as a Service da nCipher Security" External link

em Wednesday, September 18, 2019 2:57:00 PM EAT

Kevin Bocek disse : "Como líder em proteção de identidade de máquina, a Venafi está contente com o lançamento do novo nShield as a Service da nCipher Security" External link

noticias-terra-br Wednesday, September 18, 2019 2:50:00 PM EAT

Kevin Bocek said : "As the leader in machine identity protection, Venafi welcomes the launch of the new nShield as a Service capability from nCipher Security," External link

finanznachrichten-en Tuesday, September 17, 2019 10:49:00 AM EAT

Kevin Bocek said : "As the leader in machine identity protection, Venafi welcomes the launch of the new nShield as a Service capability from nCipher Security," External link

afp-en Tuesday, September 17, 2019 10:01:00 AM EAT

Kevin Bocek said : “There is a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government-mandated ,” External link

computerweekly Thursday, September 5, 2019 9:03:00 PM EAT

Kevin Bocek says : "There's a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government mandated encryption backdoors," External link

betanews Thursday, September 5, 2019 8:35:00 PM EAT

Kevin Bocek said : “There’s a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government mandated encryption backdoors,” External link

4-traders Thursday, September 5, 2019 3:45:00 PM EAT

Kevin Bocek said : “Last month, the US Senate Intelligence Committee reported that election systems in all 50 states were targeted by Russia during the 2016 election,” External link

computerweekly Thursday, August 22, 2019 8:37:00 PM EAT

Kevin Bocek added : “On a consumer level, people want technology that prioritises the security and privacy of their personal data. This kind of trust is priceless. Encryption backdoors would not only make us much less safe at a national level, they also clearly have the potential to inflict significant economic and political damage” External link

computerweekly Thursday, August 22, 2019 8:37:00 PM EAT

Kevin Bocek said : “Last month, the U.S. Senate Intelligence Committee reported that election systems in all 50 states were targeted by Russia during the 2016 election,” External link

4-traders Thursday, August 22, 2019 3:53:00 PM EAT

Kevin Bocek added : “On a consumer level, people want technology that prioritizes the security and privacy of their personal data. This kind of trust is priceless. Encryption backdoors would not only make us much less safe at a national level, they also clearly have the potential to inflict significant economic and political damage” External link

4-traders Thursday, August 22, 2019 3:53:00 PM EAT

Kevin Bocek said : “Today, every organization is a software developer building apps, libraries, containers and other tools,” External link

4-traders Thursday, July 25, 2019 3:47:00 PM EAT

Kevin Bocek concludes : “Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments. It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe” External link

4-traders Thursday, July 25, 2019 3:47:00 PM EAT

Kevin Bocek said : “When the code-signing keys and certificates that serve as machine identities fall into the hands of attackers, they can inflict enormous damage,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “The reality is that every organisation is now in the software development business, from banks to retailers to manufacturers,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “Security teams and developers look at code-signing security in radically different ways. Developers are primarily concerned about being slowed down because of their security teams’ methods and requirements,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “Certificates control communication and authentication between machines so it’s critically important not to let them expire unexpectedly,” External link

computerweekly Thursday, May 23, 2019 7:36:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million,” External link

globalsecuritymag Thursday, May 23, 2019 4:22:00 PM EAT

Kevin Bocek added : “Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult” External link

globalsecuritymag Thursday, May 23, 2019 4:22:00 PM EAT

Kevin Bocek said : “Now with support for GlobalSign’s highest performing and scalable PKI service, Venafi Cloud eliminates the machine identity risks that have plagued DevOps, hybrid and multi-cloud environments,” External link

businesswire Thursday, May 16, 2019 3:51:00 PM EAT

Kevin Bocek said : “This is a tense moment for industry professionals because they know backdoors make our critical infrastructure more vulnerable,” External link

computerweekly Thursday, March 28, 2019 9:15:00 PM EAT

Kevin Bocek said : “They don’t follow the rules or buy products in controlled markets, and so countries that enact these near-sighted restrictions, harm law-abiding businesses and risk economic damage as well as intrusions focused on sovereign government processes,” External link

computerweekly Thursday, March 28, 2019 9:15:00 PM EAT

Kevin Bocek says : "This is a tense moment for industry professionals because they know backdoors make our critical infrastructure more vulnerable," External link

betanews Thursday, March 28, 2019 4:41:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million O2 mobile customers in the UK , and estimates suggest the 24-hour outage could have cost the company $100m ,” External link

computerweekly Tuesday, March 26, 2019 11:12:00 PM EAT

Kevin Bocek said : "Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million," External link

finanznachrichten-en Tuesday, March 26, 2019 3:57:00 PM EAT

Kevin Bocek added : "Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult" External link

finanznachrichten-en Tuesday, March 26, 2019 3:57:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million ,” External link

4-traders Tuesday, March 26, 2019 3:54:00 PM EAT

Kevin Bocek added : “Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult” External link

4-traders Tuesday, March 26, 2019 3:54:00 PM EAT

Kevin Bocek said : “It’s clear that security professionals feel under siege,” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek added : “Today, private companies do not have a legal right to actively defend themselves against cyberattacks” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek said : “Even if this type of action were to become legal…it’s nearly impossible to be certain about attack attribution because attackers are adept at using a wide range of technologies to mislead security professionals,” “For many organizations, it would be better to focus on establishing stronger defense mechanisms,” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the darknet,” External link

homelandsecuritynewswire Wednesday, March 20, 2019 9:34:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the darknet,” External link

eurasiareview Monday, March 11, 2019 3:33:00 AM EAT

Kevin Bocek said : "This study found clear evidence of the rampant sale of TLS certificates on the darknet," External link

sciencedaily Sunday, March 10, 2019 4:21:00 AM EAT

Kevin Bocek said : "This study found clear evidence of the rampant sale of TLS certificates on the darknet," External link

eurekalert Friday, March 8, 2019 8:44:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the dark net,” External link

computerweekly Thursday, March 7, 2019 7:25:00 PM EAT

Kevin Bocek told : “The reason machine identities are so important is that everything a global bank does, for example, from retail banking payment processing to trading is all dependent on machine identities, and so by extension, the whole economy is dependent on this,” External link

computerweekly Thursday, March 7, 2019 7:25:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the dark net,” External link

4-traders Wednesday, March 6, 2019 11:44:00 AM EAT

Kevin Bocek said : “Our integration with nCipher nShield HSMs is easy to deploy, reduces errors and dramatically cuts the time and resources required to use SSL and TLS keys and certificates with HSMs,” External link

businesswire Tuesday, February 19, 2019 6:33:00 PM EAT

Kevin Bocek said ( about In The ) : “The Machine Identity Protection Development Fund is the next logical step for cyber security,” External link

computerweekly Thursday, December 13, 2018 7:55:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

marketwatch Thursday, December 6, 2018 5:11:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

4-traders Thursday, December 6, 2018 4:55:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

businesswire Thursday, December 6, 2018 4:49:00 PM EAT



Key Titles and Phrases Count Lang Last Seen
chief security50.00%EN03/09/201709/03/2017
chief50.00%EN01/20/201720/01/2017
Names Lang Count
Kevin BocekFR64.29%
Kevin BocekEN35.71%


 
Show/hide duplicate news articles.
<<10<12345678910>>>10
 
Show/hide duplicate news articles.
<<10<12345678910>>>10

Tools

Load latest edition

Sunday, July 5, 2020

5:03:00 PM EAT

Languages Collapse menu...Expand menu...

Select your languages

af
am
ar
de
en
es
fr
ha
pt
rw
sw
all
Show additional languagesHide additional languages

Interface:

Legend Collapse menu...Expand menu...


Quotes... Explore Relations


EMM Visual Explorer


AfricaBrief

Kevin Bocek

Last updated on 2017-01-21T00:05+0300.

About this image

sign

Quotes... Extracted quotes from

Kevin Bocek says : "According to a Venafi survey from 2018 , once IT professionals deployed a comprehensive machine identity protection solution, they typically found 57,000 TLS machine identities that they did not know they had in their businesses and cloud," External link

betanews Wednesday, July 1, 2020 12:40:00 PM EAT

Kevin Bocek says : "Many of the cyber attacks targeting elections come from machines, which can automatically spread information and direct attacks on the systems that count votes," External link

betanews Thursday, June 11, 2020 2:06:00 PM EAT

Kevin Bocek said : "The integration of Futurex with the Venafi Trust Protection Platform is an exciting development that our mutual customers have asked for," External link

news-yahoo Tuesday, June 9, 2020 5:50:00 PM EAT

Kevin Bocek says : "Security professionals are under constant siege from very sophisticated threat actors targeting government, military and private organizations," External link

betanews Thursday, March 12, 2020 2:43:00 PM EAT

Kevin Bocek adds : "The sophisticated cyberattacks that are the hallmark of nation state attacks often target digital keys and certificates that serve as machine identities," "These critical security assets are often poorly protected and provide attackers with the ability to hide in encrypted traffic, pivot across networks and eavesdrop on sensitive data. Any organization that isn't protecting machine identities at least as well as they protect usernames and password is at greater risk of becoming a victim of a cyberattack. And, unfortunately, these risks are unlikely to change in the near term because most organizations are just beginning to understand these risks" External link

betanews Thursday, March 12, 2020 2:43:00 PM EAT

Kevin Bocek said : “To reduce security risk and improve reliability, CISO’s want faster and more comprehensive machine identity protection across the extended enterprise,” External link

4-traders Tuesday, November 26, 2019 4:33:00 PM EAT

Kevin Bocek says : “Mounting an attack requires resources and a level of effort. That then points back to a certain set of adversaries that could have completed it. So if we see, for example, the likes of Russia trying to manipulate the elections, it’s most likely that it won’t be en-masse and we’ll be targeted in places that lead to a greater outcome” External link

globalsecuritymag Thursday, November 7, 2019 9:03:00 PM EAT

Kevin Bocek concludes : “I think it’s our ability to respond and to recover now, that’s as important as preventing the breach. So for example, how can we bring back that trust and confidence as soon as possible? These are things that haven’t been worked on at all. We’re still very much in the early stages” External link

globalsecuritymag Thursday, November 7, 2019 9:03:00 PM EAT

Kevin Bocek said : “As digital transformation drives the need for DevOps, multi-cloud and microservice strategies, the number of machine identities—like TLS keys and certificates—on enterprise networks is exploding,” External link

businesswire Friday, October 25, 2019 1:17:00 AM EAT

Kevin Bocek said : “As digital transformation drives the need for DevOps, multi-cloud and microservice strategies, the number of machine identitieslike TLS keys and certificateson enterprise networks is exploding,” External link

4-traders Thursday, October 24, 2019 3:50:00 PM EAT

Kevin Bocek said : “Machine identities are extremely valuable targets for cyber criminals and large enterprises often have tens of thousands of machine identities they need to protect,” External link

computerweekly Tuesday, October 22, 2019 6:25:00 PM EAT

Kevin Bocek says : "It's clear the public is nearly as skeptical of government claims around privacy and security as they are of the same claims coming from social media companies," External link

betanews Thursday, September 26, 2019 3:05:00 PM EAT

Kevin Bocek sagte : "Als führendes Unternehmen für den Schutz von Maschinenidentitäten begrüßt Venafi die Herausgabe der neuen Kapazitäten von nShield as a Service durch nCipher Security" External link

finanznachrichten-en Wednesday, September 18, 2019 9:42:00 PM EAT

Kevin Bocek disse : "Como líder em proteção de identidade de máquina, a Venafi está contente com o lançamento do novo nShield as a Service da nCipher Security" External link

em Wednesday, September 18, 2019 2:57:00 PM EAT

Kevin Bocek disse : "Como líder em proteção de identidade de máquina, a Venafi está contente com o lançamento do novo nShield as a Service da nCipher Security" External link

noticias-terra-br Wednesday, September 18, 2019 2:50:00 PM EAT

Kevin Bocek said : "As the leader in machine identity protection, Venafi welcomes the launch of the new nShield as a Service capability from nCipher Security," External link

finanznachrichten-en Tuesday, September 17, 2019 10:49:00 AM EAT

Kevin Bocek said : "As the leader in machine identity protection, Venafi welcomes the launch of the new nShield as a Service capability from nCipher Security," External link

afp-en Tuesday, September 17, 2019 10:01:00 AM EAT

Kevin Bocek said : “There is a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government-mandated ,” External link

computerweekly Thursday, September 5, 2019 9:03:00 PM EAT

Kevin Bocek says : "There's a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government mandated encryption backdoors," External link

betanews Thursday, September 5, 2019 8:35:00 PM EAT

Kevin Bocek said : “There’s a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government mandated encryption backdoors,” External link

4-traders Thursday, September 5, 2019 3:45:00 PM EAT

Kevin Bocek said : “Last month, the US Senate Intelligence Committee reported that election systems in all 50 states were targeted by Russia during the 2016 election,” External link

computerweekly Thursday, August 22, 2019 8:37:00 PM EAT

Kevin Bocek added : “On a consumer level, people want technology that prioritises the security and privacy of their personal data. This kind of trust is priceless. Encryption backdoors would not only make us much less safe at a national level, they also clearly have the potential to inflict significant economic and political damage” External link

computerweekly Thursday, August 22, 2019 8:37:00 PM EAT

Kevin Bocek said : “Last month, the U.S. Senate Intelligence Committee reported that election systems in all 50 states were targeted by Russia during the 2016 election,” External link

4-traders Thursday, August 22, 2019 3:53:00 PM EAT

Kevin Bocek added : “On a consumer level, people want technology that prioritizes the security and privacy of their personal data. This kind of trust is priceless. Encryption backdoors would not only make us much less safe at a national level, they also clearly have the potential to inflict significant economic and political damage” External link

4-traders Thursday, August 22, 2019 3:53:00 PM EAT

Kevin Bocek said : “Today, every organization is a software developer building apps, libraries, containers and other tools,” External link

4-traders Thursday, July 25, 2019 3:47:00 PM EAT

Kevin Bocek concludes : “Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments. It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe” External link

4-traders Thursday, July 25, 2019 3:47:00 PM EAT

Kevin Bocek said : “When the code-signing keys and certificates that serve as machine identities fall into the hands of attackers, they can inflict enormous damage,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “The reality is that every organisation is now in the software development business, from banks to retailers to manufacturers,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “Security teams and developers look at code-signing security in radically different ways. Developers are primarily concerned about being slowed down because of their security teams’ methods and requirements,” External link

computerweekly Tuesday, June 11, 2019 5:14:00 PM EAT

Kevin Bocek said : “Certificates control communication and authentication between machines so it’s critically important not to let them expire unexpectedly,” External link

computerweekly Thursday, May 23, 2019 7:36:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million,” External link

globalsecuritymag Thursday, May 23, 2019 4:22:00 PM EAT

Kevin Bocek added : “Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult” External link

globalsecuritymag Thursday, May 23, 2019 4:22:00 PM EAT

Kevin Bocek said : “Now with support for GlobalSign’s highest performing and scalable PKI service, Venafi Cloud eliminates the machine identity risks that have plagued DevOps, hybrid and multi-cloud environments,” External link

businesswire Thursday, May 16, 2019 3:51:00 PM EAT

Kevin Bocek said : “This is a tense moment for industry professionals because they know backdoors make our critical infrastructure more vulnerable,” External link

computerweekly Thursday, March 28, 2019 9:15:00 PM EAT

Kevin Bocek said : “They don’t follow the rules or buy products in controlled markets, and so countries that enact these near-sighted restrictions, harm law-abiding businesses and risk economic damage as well as intrusions focused on sovereign government processes,” External link

computerweekly Thursday, March 28, 2019 9:15:00 PM EAT

Kevin Bocek says : "This is a tense moment for industry professionals because they know backdoors make our critical infrastructure more vulnerable," External link

betanews Thursday, March 28, 2019 4:41:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million O2 mobile customers in the UK , and estimates suggest the 24-hour outage could have cost the company $100m ,” External link

computerweekly Tuesday, March 26, 2019 11:12:00 PM EAT

Kevin Bocek said : "Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million," External link

finanznachrichten-en Tuesday, March 26, 2019 3:57:00 PM EAT

Kevin Bocek added : "Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult" External link

finanznachrichten-en Tuesday, March 26, 2019 3:57:00 PM EAT

Kevin Bocek said : “Recently, a machine identity-related outage impacted 32 million cellular customers in the U.K., and estimates suggest this could have cost the company over $100 million ,” External link

4-traders Tuesday, March 26, 2019 3:54:00 PM EAT

Kevin Bocek added : “Since certificates control authentication and communication between machines, it is important not to let them expire unexpectedly. And because the symptoms of a machine identity-related outage mimic many other hardware and software failures, diagnosing them is notoriously time-consuming and difficult” External link

4-traders Tuesday, March 26, 2019 3:54:00 PM EAT

Kevin Bocek said : “It’s clear that security professionals feel under siege,” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek added : “Today, private companies do not have a legal right to actively defend themselves against cyberattacks” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek said : “Even if this type of action were to become legal…it’s nearly impossible to be certain about attack attribution because attackers are adept at using a wide range of technologies to mislead security professionals,” “For many organizations, it would be better to focus on establishing stronger defense mechanisms,” External link

foxnews Saturday, March 23, 2019 3:31:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the darknet,” External link

homelandsecuritynewswire Wednesday, March 20, 2019 9:34:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the darknet,” External link

eurasiareview Monday, March 11, 2019 3:33:00 AM EAT

Kevin Bocek said : "This study found clear evidence of the rampant sale of TLS certificates on the darknet," External link

sciencedaily Sunday, March 10, 2019 4:21:00 AM EAT

Kevin Bocek said : "This study found clear evidence of the rampant sale of TLS certificates on the darknet," External link

eurekalert Friday, March 8, 2019 8:44:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the dark net,” External link

computerweekly Thursday, March 7, 2019 7:25:00 PM EAT

Kevin Bocek told : “The reason machine identities are so important is that everything a global bank does, for example, from retail banking payment processing to trading is all dependent on machine identities, and so by extension, the whole economy is dependent on this,” External link

computerweekly Thursday, March 7, 2019 7:25:00 PM EAT

Kevin Bocek said : “This study found clear evidence of the rampant sale of TLS certificates on the dark net,” External link

4-traders Wednesday, March 6, 2019 11:44:00 AM EAT

Kevin Bocek said : “Our integration with nCipher nShield HSMs is easy to deploy, reduces errors and dramatically cuts the time and resources required to use SSL and TLS keys and certificates with HSMs,” External link

businesswire Tuesday, February 19, 2019 6:33:00 PM EAT

Kevin Bocek said ( about In The ) : “The Machine Identity Protection Development Fund is the next logical step for cyber security,” External link

computerweekly Thursday, December 13, 2018 7:55:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

marketwatch Thursday, December 6, 2018 5:11:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

4-traders Thursday, December 6, 2018 4:55:00 PM EAT

Kevin Bocek said : “The rapid adoption of DevOps, microservices, cloud, and IoT requires a new level of technical sophistication and innovation to deliver protection for all machine identities,” External link

businesswire Thursday, December 6, 2018 4:49:00 PM EAT



Key Titles and Phrases Count Lang Last Seen
chief security50.00%EN03/09/201709/03/2017
chief50.00%EN01/20/201720/01/2017
Names Lang Count
Kevin BocekFR64.29%
Kevin BocekEN35.71%


<<10<12345678910>>>10
<<10<12345678910>>>10

Tools

Load latest edition

Sunday, July 5, 2020

5:03:00 PM EAT


Quotes... Explore Relations


EMM Visual Explorer