David Finger

David Finger has spent more than 12 years in the enterprise security space, currently at Fortinet and previously with Trend Micro, ProofPoint and Sana Security among others. His direct customer engagement spans security challenges and solutions from endpoint and server through gateway and cloud, for both threat and data protection, all around the world.

Think You Are Prepared for Ransomware? You’re Probably Not.

How Much Risk Are You Willing to Take?

How Much Risk Are You Willing to Take?

Because vendors often have different prices for different combinations of features, organizations need to determine which features they need to procure and deploy to reduce their risk to an acceptable level.

Work from Anywhere Doesn't Work Without Endpoint Security

Work from Anywhere Doesn't Work Without Endpoint Security

Cybercriminals are targeting the work from anywhere workforce, which coupled with the increasingly sophisticated threat landscape underscores exactly how important endpoint security is for organizations.

Endpoint Detection and Response is a Key Weapon in the Battle Against Ransomware

Endpoint Detection and Response is a Key Weapon in the Battle Against Ransomware

The most important technology to preventing ransomware damage is advanced endpoint security that unifies the prevention, detection and response function in order to operate in real-time.

Choosing the Right XDR Solution for Your Organization

Choosing the Right XDR Solution for Your Organization

Security teams already often respond too slowly to alerts, have time for fewer investigations, and run a greater risk of missing an attack in progress.

Managing Risk, Resources, and Results with SOAR Solutions

Managing Risk, Resources, and Results with SOAR Solutions

With the right SOAR solution in place, security teams can increase efficiency by automating every task, change, or update according to the organization’s needs.

Real Time Matters in Endpoint Protection

Real Time Matters in Endpoint Protection

The new generation of endpoint detection and response (EDR) solutions is not only able to detect threats, but also immediately defuse them to stop attackers from achieving their goals in real-time.

What to do when you are on the receiving end of a data breach

Earlier in the week I shared my experience, which is probably (or at least hopefully) like most, with having credit card information stolen.   Since that time, there’s been a nice article written with some common sense ways for...

Data Theft: It happens to us all

Although I have written quite a bit about data breaches recently, and have certainly followed them over the years I’ve worked in the security industry, I had yet to become a victim. Until last week that is.

Beware of Cybercriminals

“I didn’t know that people would come here, in West Haven, one of the best car washes in West Haven, to [steal credit card information], so it was very surprising.”

New travel risks

With two young boys at home and a quick “in and out” trip to DC putting me on a plane twice in four days, my wife was naturally worried about my safety.

Gartner on where to spend the next security dollar

I just returned from the Gartner Security and Risk Management Summit in National Harbor Maryland and wanted to share a bit from one of the more interesting sessions I attended, a panel discussion entitled “Network vs. Endpoint vs....

Load More