-
Rob is news director in the Security Media Group where he helps prioritize and build cohesive news coverage across the group's websites in the TechTarget portfolio. As a news reporter and editor for SearchSecurity.com, he produces news stories daily on breaking cybersecurity news and trending topics as well as topical podcasts and videos. He is producer of SearchSecurity's Security Wire Weekly podcast. Since joining TechTarget in July 2003, Rob has covered SAP, Oracle and the database industry for SearchDatabase.com, SearchSAP.com and SearchOracle.com. Prior to joining TechTarget, Rob was a newspaper reporter for five years at The Day in New London, Conn., where he wrote a variety of crime, general news, government and business stories while covering towns in Southeastern Connecticut. A military veteran, Rob served four years with the U.S. Air Force, U.S. Forces Police in Kaiserslautern Germany. He holds a degree in journalism from the University of Connecticut.
-
- Follow:
Contributions from Robert Westervelt, News Director
- Stuxnet-like Duqu Trojan offers hint of future attacks
- Despite low numbers zero-day exploits pack a punch
- Symantec outlines Android fraud schemes
- IBM, McAfee make SIEM acquisitions
- Developing risk decision-making criteria a challenge
- Firms struggle to address social networking issues
- Verizon PCI report: Compliance not an ongoing effort
- Cigital BSIMM 3 study provides secure coding metrics
- Breaches prompt call for CA alternatives
- Mobile carriers gaining increased security duties
- PCI Council to certify point-to-point encryption
- Intel demonstrates McAfee DeepSAFE security platform
- Study tracks first signs of Android botnet infections
- GlobalSign temporarily halts issuing certificates
- DigiNotar CA breach widens; Dutch officials take action
- PCI tokenization: Vendors need to iron out differences
- Browser makers block rogue SSL certificate
- Android attacks outpace all other mobile platforms
- IBM researchers push for secure open wireless networks
- SpyEye source code leaks could fuel new wave of attacks
Security Management Strategies for the CIO