Ounce Labs Announces Launch Of 'Suitable Security' Blog

Jack Danahy, company founder and CTO, starts blog to provide commentary about security and industry trends

March 2, 2009

2 Min Read

PRESS RELEASE

WALTHAM, Mass., March 2 -- Ounce Labs, the industry leader in enterprise static application security testing (SAST), today announced that its co-founder and CTO (chief technology officer), Jack Danahy, has established a blog to provide commentary about security and industry trends. His blog, titled "Suitable Security," can be found at http://suitablesecurity.blogspot.com/.

Jack is a serial entrepreneur and a frequent speaker and writer about information security topics. He has contributed to the U.S. Army War College; the Center on Law, Ethics and National Security; and the House Subcommittee on Information Technology. He also holds five patents and has additional patents pending in kernel security, secure remote communications, systems management and distributed computing.

"Having spent almost twenty years in the security industry, I've witnessed its evolution - both positive and negative. This blog provides a platform for me to share some of my experiences and thoughts with a larger audience," Danahy said. "There is never enough dialog that can take place when discussing issues as important as security, so I'm blogging about my opinions and information I think is interesting or important, because I believe that with enough of the right information, people will make better decisions about security."

Recent posts from Suitable Security include:

Are We Looking at an ID Theft Stimulus Package? - In which Jack comments about the concept of a national repository for the healthcare records of all U.S. citizens, as proposed by the recent economic stimulus bill.

Cyber security and the lessons of Hurricane Katrina - In which Jack compares the reactionary improvements in protective dike levels in New Orleans to increasingly powerful hurricanes vis-a-vis cyber security reactions to increasingly large data breaches.

Five rules to saving money by avoiding security shelfware - In which Jack recommends tactics for eliminating unused security software - and worse - unaddressed security problems.

Jack's Suitable Security blog is located here: http://suitablesecurity.blogspot.com/

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights