Profile of Michael A. Davis
CTO of CounterTack
News & Commentary Posts: 24
Michael A. Davis has been privileged to help shape and educate the globalcommunity on the evolution of IT security. His portfolio of clients includes international corporations such as AT&T, Sears, and Exelon as well as the U.S. Department of Defense. Davis's early embrace of entrepreneurship earned him a spot on BusinessWeek's "Top 25 Under 25"
list, recognizing his launch of IT security consulting firm Savid Technologies, one of the fastest-growing companies of its decade. He has a passion for educating others and, as a contributing author for the *Hacking Exposed* books, has become a keynote speaker at dozens of conferences and symposiums worldwide.
Davis serves as CTO of CounterTack, provider of an endpoint security platform delivering real-time cyberthreat detection and forensics. He joined the company because he recognized that the battle is moving to the endpoint and that conventional IT security technologies can't protect enterprises. Rather, he saw a need to deliver to the community continuous attack monitoring backed by automated threat analysis.
Davis brings a solid background in IT threat assessment and protection to his latest posting, having been Senior Manager Global Threats for McAfee prior to launching Savid, which was acquired by External IT. Aside from his work advancing cybersecurity, Davis writes for industry publications including InformationWeek and Dark Reading. Additionally, he has been a partner in a number of diverse entrepreneurial startups; held a leadership position at 3Com; managed two Internet service providers; and recently served as President/CEO of the InClaro Group, a firm providing information security advisory and consulting services based on a unique risk assessment methodology.
Articles by Michael A. Davis
12/3/2014
We can't stop every attack, so we need a new mantra: Detect and respond. Here are the essential tools, skills, and processes.
Post a Comment
5/12/2014
Tight budgets. A manpower crunch. More -- and more sophisticated -- threats. Are you sure you're up to this?
Post a Comment
1/6/2014
Can the trendy tech strategy of DevOps really bring together developers and IT operations to deliver better apps faster? Our survey shows a mixed bag of results.
Post a Comment
11/1/2013
Mobility and BYOD are no different from any other IT security challenge, so it's time for an integrated approach across all the ways people work.
Post a Comment
7/11/2013
The evolution of IT as a service and other forces are fundamentally changing how agencies need to think about the next generation of networks.
Post a Comment
4/26/2013
Uncle Sam is a leader in the secure use of cloud services. Here’s what FedRAMP and FISMA can teach you.
Post a Comment
1/28/2013
What does BlackBerry Enterprise Service 10 really bring to the table in terms of new enterprise management, security and true enterprise mobility?
Post a Comment
1/18/2013
Tired of having malware punch you in the face? The time's not right to hit back, but here are moves to make now.
Post a Comment
11/20/2012
Users of Symantec security software will find similar interface.
Post a Comment
11/20/2012
It's not an easy option unless you're a heavy-duty BlackBerry shop.
Post a Comment
11/20/2012
Good's on its way to data-centric security.
Post a Comment
11/20/2012
Here's what to look for in MDM software and what limitations IT still faces in letting employees use personal devices for work.
Post a Comment
10/24/2012
Windows 8 makes securing enterprise PCs and tablets easier--and shows that the future of enterprise Windows security is proper control of applications.
Post a Comment
3/28/2012
If it seems security is an afterthought in the big data ecosystem, you’re right. Here’s what to do about it.
Post a Comment
3/14/2012
Retailers' options for accepting payments via smartphones are all over the map. Smart companies will use them to build loyalty as well as get paid.
Post a Comment
12/2/2011
Analyzing how mobility could lead to data loss feels like taking a shot in the dark. At a moving target, with a blindfold on. But there are ways to quantify the threat.
Post a Comment
11/15/2011
Whether mobility is a problem or an opportunity depends not on software but on your policies.
Post a Comment
11/10/2011
How to make an MSP work for your business.
Post a Comment
10/10/2011
Are you ready for mobile device management as just another monthly service--and fee--from your carrier?
Post a Comment
10/6/2011
Take these 4 steps to improve the security of your virtualization infrastructure.
Post a Comment
10/5/2011
Remember that Dilbert cartoon where the waitress comes back wearing a fur coat? Wireless store employees may be the next ones wearing mink, thanks to your data.
Post a Comment
9/28/2011
How do you secure these devices, and prevent them from accessing the network, without help from your mobile device management system?
Post a Comment
9/22/2011
Most IT shops are outsourcing the actual development of mobile apps. But IT leaders still must set a clear strategy for how they'll develop, deploy, and support these apps.
Post a Comment
9/22/2011
The next iteration of virtual currencies like Farm Cash could do real-world damage to your wallet.
Post a Comment