-
Rob is news director in the Security Media Group where he helps prioritize and build cohesive news coverage across the group's websites in the TechTarget portfolio. As a news reporter and editor for SearchSecurity.com, he produces news stories daily on breaking cybersecurity news and trending topics as well as topical podcasts and videos. He is producer of SearchSecurity's Security Wire Weekly podcast. Since joining TechTarget in July 2003, Rob has covered SAP, Oracle and the database industry for SearchDatabase.com, SearchSAP.com and SearchOracle.com. Prior to joining TechTarget, Rob was a newspaper reporter for five years at The Day in New London, Conn., where he wrote a variety of crime, general news, government and business stories while covering towns in Southeastern Connecticut. A military veteran, Rob served four years with the U.S. Air Force, U.S. Forces Police in Kaiserslautern Germany. He holds a degree in journalism from the University of Connecticut.
-
- Follow:
Contributions from Robert Westervelt, News Director
- TippingPoint ZDI fixes record number of vulnerabilities
- Mozilla proposes Firefox Do Not Track feature
- Cisco says attackers to target Apple, Android devices
- Microsoft releases Attack Surface Analyzer
- Sandboxing bolsters security, but has flaws, expert say
- Adobe to overhaul Flash Player to bolster privacy
- PCI survey: More compliance spending to meet guidelines
- Microsoft repairs critical Windows flaw
- Testing firm finds increase in IPS security performance
- Researcher breaks Adobe Flash sandbox security feature
- Sourcefire buys Immunet for cloud-based antivirus
- Researcher uncovers dozens of browser vulnerabilities
- Dell to acquire SecureWorks for security services
- IBM predicts critical infrastructure attacks in 2011
- Microsoft Outlook 2007 update caused issues
- DDoS expert: Serious application-layer attacks likely
- Core Security launches CISO-level pen testing software
- Microsoft repairs critical IE flaws, Stuxnet flaw
- Computer security training could prevent some data loss
- Compliance hampers vulnerability management processes
Security Management Strategies for the CIO