<
>

Morey J. Haber, Chief Technology Officer, Chief Information Security Officer, BeyondTrust

With more than 20 years of IT industry experience and author of Privileged Attack Vectors and Asset Attack Vectors, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees the vision for BeyondTrust technology encompassing privileged access management, remote access, and vulnerability management solutions, and BeyondTrust’s own internal information security strategies. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.
 

Please login create discussion.
Subject:

Message:

What’s the harm of playing a quick game on my break?
 
What Battlestar Galactica and Privileged Access Management have in common?

The Invisible Thread Between Dolphins and Digital Personal Assistants

Executive Strength in Digital Security Leadership 

Ten Reasons to be Pessimistic About Cyber Security 

Ten Reasons to be Optimistic About Cyber Security


Securing Blockchain with Privileged Access Management

When A Spear Phisher Coer For You

BIOMETRIC DATA: RIPE FOR ABUSE AND MISUSE?


DON’T LET STOLEN PASSWORDS MAKE YOU EASY PREY FOR CYBER CRIMINALS


Are You a Password Recycler or Cycler? One is a Security Best Practice, the Other, a Disaster Waiting to Happen



Solving an Age-Old Problem with a Single IT Security Recommendation