About
Byron Rashed has over a decade of industry experience spearheading global marketing and…
Articles by Byron
-
InfoArmor Uncovers Malicious Torrent Distribution Network
InfoArmor Uncovers Malicious Torrent Distribution Network
By Byron Rashed
-
New InfoArmor Intelligence Report Available - GovRAT 2.0 Attacking US Military and Government
New InfoArmor Intelligence Report Available - GovRAT 2.0 Attacking US Military and Government
By Byron Rashed
-
InfoArmor Chief Intelligence Officer Discusses Source Code for Sale on Forbes.com.
InfoArmor Chief Intelligence Officer Discusses Source Code for Sale on Forbes.com.
By Byron Rashed
Contributions
Activity
-
Well said Boris, terrorists should never be allowed to win.
Well said Boris, terrorists should never be allowed to win.
Liked by Byron Rashed
-
“The medieval vanity project of Donald J. Trump — called a wall.”🙄 — Cammy Harris ___ Elon Musk shared a post that Kamala Harris made in April…
“The medieval vanity project of Donald J. Trump — called a wall.”🙄 — Cammy Harris ___ Elon Musk shared a post that Kamala Harris made in April…
Liked by Byron Rashed
-
Commuting makes you: - Mentally unhealthy - Physically unhealthy - Burn hours of “you time” daily It feels like work but you don’t get paid for…
Commuting makes you: - Mentally unhealthy - Physically unhealthy - Burn hours of “you time” daily It feels like work but you don’t get paid for…
Liked by Byron Rashed
Experience
Education
Publications
-
Application Security for Salesforce Commerce Cloud in the Digital Economy
DigitSec
A shifting reliance on e-commerce has created challenges for retailers to customize the user experience while maintaining a strong cybersecurity posture. Stores and organizations handle a large cache of customer data when trading online, including names, phone numbers, personal email addresses, physical addresses, and financial information. The push to further streamline online shopping experiences during the pandemic vastly increased the data making its way through retailers’ networks.
-
How to start your cybersecurity career: Expert tips and guidance
Help Net Security
As businesses strive to protect their data and privacy, the demand for skilled cybersecurity professionals continues to grow. This article provides expert advice to help you navigate the early stages of your cybersecurity career, offering practical tips and insights.
Other authorsSee publication -
Salesforce Application Security – Protecting Hotels, Restaurants, and Resorts from Cyber Threats and Mitigating Risk
DigitSec
The interconnected digital environments within hotels and holiday resorts are a target for threat actors. Every facility contains card-readers and POS devices which store customer data long after guests have left. With individual hotels, restaurants, and resorts often connected to the organization’s national or international network, it only takes one location to be compromised before the entire company has been breached.
-
The Importance of Salesforce Application Security for the Financial Sector
DigitSec
Financial services rely on digital systems including SaaS applications, online banking, and mobile apps. Many of these organizations rely on Salesforce and Salesforce Financial Services and Experience Cloud. Since Salesforce leverages a Shared Responsibility Model, users are responsible for custom code, compliance requirements, and securing data.
-
The Healthcare Industry Under Attack
DigitSec
Healthcare consists of complex networks and contains highly prized Personally Identifiable Information (PII) that is sold and traded in the underground economy. Healthcare networks contain Internet, Intranet, IoT, SCADA, and other nodes that dramatically increase the attack surface, giving more opportunities for cybercriminals to try and exploit. Budgets are stretched, and staff members may not always have the time to complete cybersecurity training, leaving them even more vulnerable to social…
Healthcare consists of complex networks and contains highly prized Personally Identifiable Information (PII) that is sold and traded in the underground economy. Healthcare networks contain Internet, Intranet, IoT, SCADA, and other nodes that dramatically increase the attack surface, giving more opportunities for cybercriminals to try and exploit. Budgets are stretched, and staff members may not always have the time to complete cybersecurity training, leaving them even more vulnerable to social engineering tactics and attacks like ransomware and phishing emails.
-
Do You Trust and Verify Your Salesforce Application Development
DigitSec
Cybersecurity and development teams are in a constant struggle with one another. Code security is important in application development and is becoming essential for businesses that rely on SaaS.
-
Cybersecurity and SaaS Application Development – Can We All Get Along?
DigitSec
Cybersecurity teams strive to be proactive, not reactive and have stringent control of the network topography, including application security. The growing need for users to access business-critical assets and applications has exponentially increased the potential for unintentional vulnerabilities in code.
-
59K Data Breaches Reported But Only 91 Fines Imposed Since GDPR
Information Security Buzz
In response to the new 2018 breach report from cybersecurity watchdogs with DLA Piper that European companies experience 60,000 data breaches in last 8 months...
-
8 New Cyber Threats Outlined by Booz Allen Report
Information Security Buzz
Booz Allen today released its newest study, the 2019 Cyber Threat Outlook, which outlines eight new areas of cyber threats in 2019.
-
InfoArmor: Employees Compromise Cybersecurity In Holiday e-Com – How To Stop It (New Adobe Study Says 2017 e-Com to Break Records)
Information Security Buzz.com
A new study by Adobe projects Holiday Ecommerce To Hit Record $107B in 2017; Mobile Will Lead In Visits, based on Adobe data capturing an estimated 80% of online transactions from the top 100 US Web retailers.
Employees who use their corporate email accounts (either to shop or to verify ID for a personal email account) can substantially increase their employer’s risk of cyber breach-enabling compromised credentials. IT security experts from InfoArmor commented below.Other authorsSee publication -
Securing Security Against the "Triple Threat" - Utilizing a Layered IT Security Approach to Combat Internal and External Threats
GIT Security + Management
-
Beyond the First Line of Defense - Addressing the Limitations of Perimeter IT Security
Network Support Magazine
Honors & Awards
-
BIO
-
Byron Rashed has over 20 years of industry experience spearheading global marketing and public relations programs in various B2B organizations that target IT security solutions to the enterprise, SMB, and OEM markets.
As Vice President of Marketing at Centripetal, he led all marketing and PR functions and was part of the senior management team. Previously, he was the Vice President of Global Marketing, Advanced Threat Intelligence for InfoArmor (acquired by Allstate), he was directly…Byron Rashed has over 20 years of industry experience spearheading global marketing and public relations programs in various B2B organizations that target IT security solutions to the enterprise, SMB, and OEM markets.
As Vice President of Marketing at Centripetal, he led all marketing and PR functions and was part of the senior management team. Previously, he was the Vice President of Global Marketing, Advanced Threat Intelligence for InfoArmor (acquired by Allstate), he was directly responsible for creating and implementing all global marketing and public relations strategies and tactics to develop brand awareness, product positioning and corporate communications.
Prior to joining InfoArmor, Mr. Rashed was the director of global marketing and product management at Emerging Threats (acquired by Proofpoint), and has held senior level global marketing positions at Altior, FirstCarbon Solutions and SSH Communications Security, the original developer of the Secure Shell (secsh) protocol, and senior global marketing manager at VPNet Technologies (acquired by Avaya).
Mr. Rashed holds a Bachelor of Science degree in industrial engineering from New York University – Polytechnic, and a graduate certification in marketing and communications from the University of California, Irvine. He is a member of the Public Relations Society of America, American Marketing Association and Institute of Industrial Engineers.
Languages
-
English
Native or bilingual proficiency
-
Italian
Professional working proficiency
Recommendations received
31 people have recommended Byron
Join now to viewMore activity by Byron
-
insidious child indoctrination and blatant brainwashing the next generation. who abides this?
insidious child indoctrination and blatant brainwashing the next generation. who abides this?
Liked by Byron Rashed
-
🇺🇸🇺🇸🇺🇸 TRUMP TO ANNOUNCE ELON-RECOMMENDED GOVERNMENT EFFICIENCY COMMISSION Trump plans to unveil a series of economic proposals, including…
🇺🇸🇺🇸🇺🇸 TRUMP TO ANNOUNCE ELON-RECOMMENDED GOVERNMENT EFFICIENCY COMMISSION Trump plans to unveil a series of economic proposals, including…
Liked by Byron Rashed
-
If you are heading to Salesforce Dreamforce, please stop by our partner Arcsona at Trellis for a tune-up on your Salesforce application code!
If you are heading to Salesforce Dreamforce, please stop by our partner Arcsona at Trellis for a tune-up on your Salesforce application code!
Shared by Byron Rashed
-
Are you heading to Salesforce Dreamforce 24? If so, please stop by Trellis and visit Arcsona, a DigitSec partner to schedule a tune-up to check on…
Are you heading to Salesforce Dreamforce 24? If so, please stop by Trellis and visit Arcsona, a DigitSec partner to schedule a tune-up to check on…
Liked by Byron Rashed
-
Remote work means... You don't have to live in an expensive city like NYC or SF with a high cost of living if you don't want to, or if you're…
Remote work means... You don't have to live in an expensive city like NYC or SF with a high cost of living if you don't want to, or if you're…
Liked by Byron Rashed
-
TDS, please draw the line when it cones to hallowed ground. stop the blind democrat spin.
TDS, please draw the line when it cones to hallowed ground. stop the blind democrat spin.
Liked by Byron Rashed
-
Subject Matter Experts testified to the investigation committee that among the areas that were unguarded was the water tower and other elevated…
Subject Matter Experts testified to the investigation committee that among the areas that were unguarded was the water tower and other elevated…
Liked by Byron Rashed
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More