Security through data

CONTENT

  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials

FEATURED

  • CyberAlerts
  • CyberDecoded
  • CyberWeekly
  • CyberStory
  • CyberTips

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
No Result
View All Result

Blue Team Perspectives

by David Kovar

in Documents, Reports
1 min read

Kovar is the founder and CEO of URSA Inc., which is the single source of truth for unmanned system risk management. URSA answers critical operational, incident, and governance risks by visualizing system telemetry data.

He founded the practice of UAV forensics in 2015 and is one of the leading practitioners in the country. Kovar worked in digital forensics and cyber security since the mid 90’s and, prior to founding URSA he led EY’s U.S. incident response program.

“With the breadth of his experience in the industry, David is a strong addition to our Drone Advisory Council,” said Annette Taber, CompTIA’s senior vice president for industry outreach. “His insights into the drone landscape – how it is being shaped, marketed, regulated and deployed – will help guide the actions we take as an advisory council, an association, and an industry.”

“I am honored to be a part of the CompTIA Drone Advisory Council board to guide standards and practices for the drone industry,” said Kovar. “Having a measured and inclusive approach from all stakeholders to implement community practices and guidelines will be a critical part of the growing UAV industry and I am excited to participate with this team of experts.”

DOWNLOAD REPORT

Tags: Blue TeamCybersecurityDavid KovarPsychology of passwords
9
VIEWS

Related Reports

2020 Malware Research Report
Reports

2020 Malware Research Report

AUSTRALIA’S CYBER SECURITY STRATEGY 2020

AUSTRALIA’S CYBER SECURITY STRATEGY 2020

Machine Learning Methods for Malware Detection

MORE

Alerts

HEH, a new IoT P2P Botnet going after weak telnet services

Software

Tool: Skipfish

Books

Book: Phishing: Detection, Analysis And Prevention

Documentaries

Kim Dotcom: Caught in the Web (2017)

ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials
  • CyberDecoded
  • Stats
  • CyberStory
  • CyberTips
  • Cyber Weekly

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.