Morey Haber

Opinions expressed by ICN authors are their own.

With more than 20 years of IT industry experience and author of Privileged Attack Vectors, Morey Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently overseas strategy for both vulnerability and privileged access management solutions.

In 2004, Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts.

Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

The opinions expressed in this blog are those of Morey Haber and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Avoiding split-brain scenarios for security solutions

A patch in time saved nine

A patch in time saved nine

In today’s Windows environment, things are changing, and the old cliches may no longer be true.

The Apple way of (in)security

Tight hardware control and strict application policies reduce risk. So why doesn't everybody take Apple's approach to security?

Load More