Profile
Location
Austin
Member since
2019
Reads

Doug's blog archive

2019 (3)
Doug Wick

Doug Wick

VP, Products and Marketing at ALTR
Message Message me Posts: 3 Comments: 0
Bio Leading product and marketing at ALTR. The first software company to unleash the cybersecurity benefits of blockchain for the enterprise. Restoring digital trust, by fundamentally changing the way valuable data is monitored, accessed and stored. Career History With over 20 years of startup experience, I have broad experience managing product conception and development through to market success. My last role was as CEO of TradeLive, a startup marketplace for IT equipment, with previous executive roles leading product management, sales, and marketing.

Blogs

Information Security

Limiting the impact of misconfiguration and creating modified database access logs

27 Aug 2019

This is the third and final article of a three-part series which investigates the top five human threats to the data held by banks and financial institutions, and offers a fresh perspective on how the industry can make a fundamental shift away from failed perimeter protection. ____________ As organizations install new hardware or transfer to ...

Information Security

Tackling Private Data Exposure and Cyber Theft at Banks Using Privileged Database Access

22 Aug 2019

This is the second installment in a three-part series which investigates the top five threats to the data held by banks and financial institutions, and offers a fresh perspective on how the industry can make a fundamental shift away from failed perimeter protection. ____________ Banks rely on financial and physical supply chains, information syste...

Information Security

How to Address the Top 5 Threats to Banking Data

21 Aug 2019

This is the first article in a three-part series which investigates the top five threats to the data held by banks and financial institutions, and offers a fresh perspective on how the industry can make a fundamental shift away from failed perimeter protection. ____________ The first step in developing a resilient cybersecurity posture is identify...