CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

“Even the most diligent organisations are”

Tim Erlin

2 min read
in Quotes

”Even the most diligent organisations are still susceptible to attack, and to human error. Businesses need to implement and maintain a core set of foundational security controls, which is a proven strategy for reducing the risk of cyber attacks. The focus should be on a balance of tools and outcomes, and especially a balance between prevention and detection.” Tim Erlin – Vice President, Product Management and Strategy at Tripwire

Source: Information AGE

About Tim Erlin

Tim Erlin is the VP of Strategy at Tripwire. He began his career in information technology with customer service and technical support, then branched into cybersecurity early on as a sales engineer.

That solid foundation in serving customers and understanding market problems drove him into product management and strategy, where he has spent most of his more than twenty years in the industry.

Erlin is passionate about the cybersecurity industry and motivated by helping organizations operate securely. He contributes to the security community by authoring blog content, offering subject matter expertise, and through podcast interviews and speaking engagements.

Erlin is also the host of The Tripwire Cybersecurity Podcast. Tim Erlin has contributed 48 posts to The State of Security.

Related

Tags: CorporationsCorporations QuotesCybersecurityQuotequotesTim Erlin
6
VIEWS
ADVERTISEMENT

Related Posts

“App stores are filled with applications that…”

“App stores are filled with applications that…”

July 22, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as…”

July 18, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as I speak…”

July 18, 2022
“Startups are incredibly vulnerable to…”

“Startups are incredibly vulnerable to…”

July 18, 2022

More Articles

Quotes

“The certification of 5G networks emerges as…”

April 2, 2021

Amazon Fake Reviews Scam Exposed in Data Breach

May 7, 2021

DOCUMENT: U-Markt Peering into the German Cybercriminal Underground

February 9, 2021
Alerts

Dahua security advisory (AV22-388)

July 13, 2022
Tutorials

Install Tor Browser on Linux (Ubuntu, CentOS)

September 12, 2020
Alerts

IBM security advisory (AV22-412)

July 25, 2022

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

January 28, 2021
Incidents

Flagstar Bank discloses data breach impacting 1.5 million customers

June 21, 2022
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.