SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

“The effect on public infrastructure could be a power outage, or it could be something…”

1 min read
in Quotes

 

“The effect on public infrastructure could be a power outage, or it could be something more serious like a Chernobyl-style catastrophe at a nuclear plant. The problem we often see is that critical infrastructure network operators are notoriously reluctant to introduce security products into their fragile, legacy networks, which leaves the door open to hackers with malicious intent.” Daniel Cohen Sason – SW Manager – IoT Cyber Security at Check Point Software Technologies, Ltd.

Source: ZDNet

About Daniel Cohen Sason: 

Software Engineering Manager with more than 10 years of experience in software development and management of software teams. Consistently achieving high quality products and deliveries.

Responsible for the overall aspects of the software – starting from Marketing & Product Requirements, through all product life-cycle including design, software development, testing, manufacturing support, product documentation, delivery, customer support and POCs.

An expert in development of network and communication related products in Linux & Windows. Including Linux / Windows device drivers, user-space services. Mostly for Firewall / VPN / IDS/ IPS or other Cyber Security Products. Vast experience in protocol research with attention on their security vulnerabilities.

Related

Tags: Check PointCheck Point SoftwareDaniel Cohen SasonThreat ActorsThreatactors-quote
44
VIEWS
ADVERTISEMENT

Related Posts

”Threat hunting is often much easier…”

”Threat hunting is often much easier…”

June 28, 2022
”Proactive threat hunting allows your team…”

”Proactive threat hunting allows your team…”

June 28, 2022
”With threat hunting, you are using information…”

”With threat hunting, you are using information…”

June 28, 2022
”If your organization finds itself constantly…”

”If your organization finds itself constantly…”

June 28, 2022

More Articles

Website Data Breach Exposed Thousands of Gaming User Profiles

February 3, 2021
Document

CYBER SECURITY METRICS AND MEASURES

June 22, 2022
Tool

BigOps – GDPR Maintenance Tools

March 24, 2022
Blog

10 Cybersecurity Courses for 2021

January 5, 2021
Alerts

CISA Releases Five Pulse Secure-Related MARs

August 24, 2021

The Wild World of Cybercrime

April 7, 2022
Incidents

1 Million Texans Potentially Impacted By Data Breach

March 18, 2022

Hacking Exposed 7: Network Security Secrets and Solutions

October 2, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....