Finding problems that matter

July 30, 2020 | Roger Thornton
Roger Thornton

Roger Thornton

Roger Thornton has more than 25 years of experience in the computer and network security industry. He has driven the formation and growth of dozens of new companies including Fortify Software and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investor/advisor. Roger earned his BS and MS degrees in Engineering with honors at San Jose State University.

July 30, 2020 | Roger Thornton

Finding problems that matter

This blog was jointly authored with Ed Amoroso. See their previous blog for more! Towards the end of the 19th century, large cities like New York were facing a vexing problem so devastating that many questioned whether such cities could be sustained at all. People could no longer cross the street without assistance, stumbling was a common problem, disease…

July 20, 2020 | Roger Thornton

In hard times, solve big problems and do your best work

This blog was jointly authored with Ed Amoroso. There’s something eerily familiar about the COVID-19 pandemic for us in the technology world. It’s not the striking similarity to the Hollywood “end-of-the-world” movies we have all seen. No, it’s more about the fear and uncertainty that accompanies an economic downturn—the feeling…

Get the latest security news in your inbox.

Subscribe via Email

May 4, 2020 | Roger Thornton

5 defensive COVID-19 actions IT managers can take now

As if there wasn’t enough to worry about these days, cyber attacks have taken a sharp uptick since the COVID-19 pandemic began this year. From January to March, AT&T Alien Labs Open Threat Exchange (OTX) saw ​419,643 indicators of compromise (IOC) related to COVID-19, including a​ 2,000% month-over-month increase from February to March. Cybercriminals are taking advantage of…

August 1, 2019 | Roger Thornton

For mid-sized enterprises to win the cybersecurity race, the game needs to change

Why does AT&T Cybersecurity get me so excited on behalf of the mid-sized enterprises that make up the bulk of business around the globe? Well, one example I like to share is from a bicycle manufacturer I had the pleasure of visiting a few years ago. As a cycling enthusiast myself, I know these manufacturers are true experts,…

April 15, 2019 | Roger Thornton

3 enemies - the $96B in cyber crime that nobody wants to talk about

They say that bad things always come in threes. The adage may testify to little but the popularity of superstition, but for security executives today, this notion regrettably passes muster.  Crime, complexity and cost are three foes that every CISO must face, and while most companies think crime is the enemy, in many cases it is the latter two heads…

May 22, 2014 | Roger Thornton

Trust and Risk in Ether

Who do you really trust? Of course, as security practitioners, we know the best policy is to trust no one, or at least trust no one blindly. However, this policy is not all that practical in real life. We must trust a growing number of people, companies and products just to function at a most basic level today. Personal relationships,…