Press

IT-Harvest analysts are quoted frequently in major print and online media. They are also called on to address breaking news stories for television and radio. Here is a partial list of IT-Harvest mentions in the press.

---------------------------------------------------------------------------------------

  1. NSA Leak Could Be Bad Business For US Tech Companies

    NPR (blog)-Jun 21, 2013
    "The dream is over," says Richard Stiennon, an industry analyst who covers American technology companies. "The era of U.S. tech dominance ...
  2. Defcon founder's message to feds fair to some, hypocritical to others

    Computerworld-by Jaikumar Vijayan-Jul 12, 2013
    With Defcon, there's always been a bit of the "young generation versus the Man," Stiennon noted. In recent years, NSA and other three-letter ...
  3. NSA spying could mean U.S. tech companies lose international ...

    CSO-Jun 19, 2013
    The revelations also pose an economic problem for U.S. cloud providers on the international market. Richard Stiennon, chief research analyst ...
  4. Help Net Security

    Cyberattacks the greatest threat to nations, say global execs

    Network World-Jun 26, 2013
    ... mentioned cybersecurity in the State of the Union address," Richard Stiennon, chief research analyst with IT-Harvest, said in an interview.

Barracuda Networks Delivers Network Virtualization Platform For ...

Dark Reading-May 7, 2013
IT-harvest.com – Richard Stiennon, CEO at IT Harvest, and John Peterson, VP of Network Virtualization Platforms at Barracuda Networks, ...

DHS: OpUSA to Cause Limited Disruptions

BankInfoSecurity.com-by Eric Chabrow-May 4, 2013
... to easy exploitation by more targeted adversaries," says Richard Stiennon, an IT security analyst and author of the book "Surviving Cyberwar.

ISACA Conference in Munich Helps IT Professionals Thwart ...

Keynote speaker Richard Stiennon, founder of IT-Harvest, will examine the issues that make the IT security industry tick. His presentation will ...

 

SMBs are People too: Marketing Automation for the Rest of Us

Business 2 Community - Jul 17, 2012

Chief research analyst at IT-Harvest and author of UP and to the RIGHT: Strategy and Tactics of Analyst Influence, Stiennon was vice president ...


 

 

Cybersecurity Firms Ditch Defense, Learn To 'Hunt'  (NPR)

 

SpiderOak Offers 'Completely Private' Cloud Storage Higher Ed

T.H.E. Journal - Jun 20, 2012
... store a tremendous amount of data," said Richard Stiennon, chief research analyst at IT-Harvest. "Because of the high value of the intellectual ...
Network Security Assessments Reveal Global 2000 Organizations ...

 

Network Security Assessments Reveal Global 2000 Organizations ...

SYS-CON Media (press release) - 1 day ago
Said Richard Stiennon, recognized industry luminary and author of Surviving Cyber War: "Flame may have been a state-backed attack, but it ...
The Strongest Tribe: Issues of power in cyberspace

 

The Strongest Tribe: Issues of power in cyberspace

SYS-CON Media (press release) (blog) - Jun 5, 2012
Richard Stiennon reinforces this message with his latest Forbes blog on the consequences of Stuxnet. Operation Olympic Games, Stiennon ...
Weaponized Malware and its Enterprise Implications Topic of ...

Weaponized Malware and its Enterprise Implications Topic of ...

Equities.com - Jun 18, 2012
Security industry expert and author, Richard Stiennon, forensics and security analyst, Paul Henry and vice president, solution marketing, Paul ...

SpiderOak Announces First Completely Private Cloud Solution for ...

MarketWatch (press release) - Jun 12, 2012
... because they have an inherent need to store a tremendous amount of data," said Richard Stiennon, Chief Research Analyst at IT-Harvest.
Court rejects Samsung's motion for a stay regarding Galaxy Tab ...

Report: US, Israel Developed Flame

BankInfoSecurity.com - Jun 20, 2012
... on international intelligence relations," Richard Stiennon says. "The intelligence community is, if anything, secretive and leaks create distrust.

Microsoft Attempts To Douse Flame Malware

RedOrbit - Jun 15, 2012
... CEO of Venafi, inventor and market leader of Enterprise Key and Certificate Management (EKCM) solutions, tells Richard Stiennon of Forbes ...
Flame's MD5 collision is the most worrisome security discovery of ...‎ Forbes
all 43 news articles »


Midsize Insider - Jun 8, 2012
A story by security industry analyst Richard Stiennon for National Public Radio (NPR) discusses threats, analysis, and actions used by ...

 

Hackers set to dump intel-analysis firm's emails

Washington Times - December 29, 2011
... as far reaching as the WikiLeaks release of 250000 State Department cables,” said cybersecurity expert Richard Stiennon, who blogs at ThreatChaos.com. ...

 Richard Stiennon named to DefenseIQ Top Ten:

The Defence IQ 10: #CyberSecurity

'The Defence IQ 10' is a list of our top ten tweeters, influencers, bloggers and sources for news updates and analysis on a select range of topics.

Each of the ten to make our list - whether chosen for their social media klout, industry expertise, captive audience, or even just because we quite like them - all have one thing in common: they add value to the debate.

Testing the Limits With Richard Stiennon – Part I

Utest inteview with Richard Stiennon

Testing the Limits With Richard Stiennon – Part II

Second part of the interview with Ricahrd Stiennon

October 31, 2011 09:00 ET

Richard Stiennon Honored With Outstanding Achievement Award From Cenzic During Cyber Security Awareness Month

US knew of Libyan radar bugs, expert says

CRN Australia - Angela Moscaritolo - Oct 19, 2011

Had the US gone through with the cyber offensive, it would not have been the first time such an act of war was carried out by a nation, Richard Stiennon, ...

Sourcefire Claims First IPS For 40GbE

NetworkComputing.com - Steve Wexler -

“I am most intrigued by the 40GB capability,” says IT-Harvest analyst Richard Stiennon. “Many data centers are moving to 40GB so having interfaces helps ...

Computers Controlling Military Drones Reportedly Infected with Virus

PCWorld - John P. Mello Jr - Oct 7, 2011

"This is bad in so many ways," Richard Stiennon, chief research analyst with IT-Harvest in Birmingham, Mich., told PCWorld. "It indicates that the military ...

A New Call to Action - Backstage at the Michigans Cyber Summit

Government Technology (blog) - Dan Lohrmann - Oct 8, 2011

Here are a few of the reasons why: In addition to our public sector leaders, the lunch keynote presentation by Richard Stiennon offered an informative and ...

Obama Establishes Insider Threat Task Force

GovInfoSecurity.com - Oct 7, 2011

Surviving Cyberwar author Richard Stiennon, a former Gartner IT security analyst, praises the executive order but sees it as long overdue and believes it ...


 

 

Focus.com Launches Interactive Live Event App for Business ...

MarketWatch (press release)-

... Twitter's most followed IT security analyst and Forbes blogger Richard Stiennon, and business intelligence expert and President of NAVinture Jonathan Wu ...

 

  1. Information Security and Risk Management Conference


    Sarbanes-Oxley Compliance Journal - Sep 8, 2011

    In his keynote address titled, "What Makes the IT Security Industry Tick," Richard Stiennon, founder of IT-Harvest and author of Surviving Cyber War, ...



    Sarbanes-Oxley Compliance Journal
  2. Does cybercrime cost more than the drug trade?


    CRN Australia - Angela Moscaritolo - Sep 8, 2011

    “Comparing cybercrime 'losses' to drug trade 'gains' is nonsensical,” Richard Stiennon, chief research analyst at security advisory firm IT-Harvest, ...

  3. Focus.com 為尋求諮詢的業務專業人士推出互動即時活動應用


    財華網 - 3 hours ago

    ... 創始人兼首席戰略官Andrew Kordek,Twitter 最受歡迎的IT 安全分析師和《福佈斯》(Forbes) 博主Richard Stiennon 和業務智慧專家兼NAVinture 總裁Jonathan Wu。

  4. 如何减少APT攻击造成的损失?Google Translate


    比特网 - 5 days ago

    “最大的担忧就是1%非常有针对性的攻击你没有检测到,”Stiennon表示。 白名单可以帮助平息有针对性的攻击,他表示。对白名单的批评就是很多企业并不一定知道在他们系统 ...

  5. Symantec: Cybercrime evenaart drugshandel


    Security.nl - Sep 8, 2011

    In het verleden was het McAfee dat cybercrime groter dan de drugshandel bestempelde, maar volgens analist Richard Stiennon zijn deze cijfers nergens op ...

Richard Stiennon named one of Top 25 Most Powerful Voices in Security.

stiennon top 25 most powerful

TechTalk Episode 233 interviews Stiennon and VaporStream CEO Jack Hembrough

Cyber Defense Agency Faces Challenges From Within

Huffington Post - July 29, 2011

Richard Stiennon, chief research analyst at IT Harvest, ... "The problem is the bad guys need just one little chink in the armor," Stiennon said. ...

NATO hack attack a sign of the times: analyst

Stiennon of IT-Harvest discusses NATO attack
CTV.ca - July 22, 2011

That's the view of Richard Stiennon, an IT security analyst who has been ... Stiennon said organizations like NATO are constantly being targeted for the ...

Exploiting the Term Cyberattack

GovInfoSecurity.com (blog) - Eric Chabrow - Jul 11, 2011

When I spoke last year with Richard Stiennon, author of Surviving Cyberwar, he differentiated cyberwar from cyberattacks (see Cyberwar: Defining It, ...

Book Review: Cyber Warfare

Slashdot - 1 day ago

Stiennon's book, Surviving Cyberwar, is a good place to start if you are new to the subject and is almost a prerequisite for this book. ...



Fixing America's Cybersecurity Problems

In Depth with Francis Rose, Federal News Radio, June 27, 2011

Interview with Richard Stiennon

How to Stop Hack Attacks In One Easy Step: Whitelisting


PCWorld - Tony Bradley - 5 days ago

In a blog post on Intelligent | Whitelisting, Richard Stiennon, author of Surviving ... Stiennon recognizes that there are objections to whitelisting--too ...

Top Layer Announces Expanded Strategic Direction and New Company ...


MarketWatch (press release) - Jun 16, 2011

... and losses associated with these DDoS attacks, which now occur at the application layer," said Richard Stiennon, Chief Research Analyst at IT-Harvest. ...

Trend Micro Debuts Malware Sandbox For Security ManagersInformationWeek - Mathew J. Schwartz - Jun 14, 2011

 

Stiennon said the bigger issue--at least, based on market growth--is that security administrators must spot outbreaks as quickly as possible, ...

CIA Web site hacked; group LulzSec takes credit

Washington Post - Ellen Nakashima - June 15, 2011

“Web sites are the low-hanging fruit,” said Richard Stiennon, a cyber expert and author of “Surviving Cyberwar.” “But the Web sites are running on a server. ...

Interview on CTV News about Lockheed Martin attack using stolen RSA SecurID tokens.

Screenshot from CTV interview with Richard Stiennon

Lockheed cyberattack exposes flaws

Attacks on IMF, Lockheed, others highlight need for defenses ...


Computerworld New Zealand - Jaikumar Vijayan - 1 hour ago

Continuous network monitoring using intrusion detection systems alone is "useless" against targeted attacks, said Richard Stiennon, an analyst with ...

In wake of breach, RSA names chief security officer


Computerworld - Jaikumar Vijayan -

"Eddie is taking on this role at a critical time for RSA," said Richard Stiennon, an analyst with IT-Harvest. "Not only have they experienced a major ...

China and the US: Sizing up for cyber war?


Aljazeera.net -

"The [US] defence department, just like everyone else, is struggling with the rapid rise of cyber threats," says Richard Stiennon, the security analyst. ...

Financial Times - Joseph Menn - 

Richard Stiennon, a former Gartner security analyst and author of a recent book on cyberwar, said: “If there is a direct connection between the RSA breach ...

Francis Rose on Federal News Radio  Stiennon: Cyberwar could create broad fallout
Dec 15th 2010

Obama Pushes Cybersecurity Plan


PCWorld - Jaikumar Vijayan - May 13, 2011

However, Richard Stiennon, an analyst with IT Harvest, said that there's little in the proposals that would move the needle significantly on cybersecurity. ...

Sony Cyber Breach Worsens: Another 25M Hacked


Fox Business - Jennifer Booton - May 3, 2011

Security expert Richard Stiennon said the breach has drawn a lot of attention, including attention from other attackers, noting it wouldn't be surprising if ...

Sophos??UTM??Astaro


iThome Online - May 8, 2011

??Sophos?Astaro???????????,????????Richard Stiennon??,?????????????????,???????????????????? ...

Ciberespacio, crimen organizado y seguridad nacional


ALAI-América Latina en Movimiento - May 9, 2011

A Beijing también se le acusa de respaldar ataques de hackers contra Japón y Taiwán.21 Richard Stiennon, por su parte, detalla la geopolítica de los ...

Vendors Tap Into Cloud Security Concerns With New Encryption...


PC World - Apr 12, 2011

Such technologies give companies an immediate way to protect data in their existing cloud applications, said Richard Stiennon, a security analyst at ...

«????»TippingPoint?????????????


???? - Apr 3, 2011

IT-Harvest???????????Richard Stiennon??:???????????? ????????????(distributed denial of service; DDoS)?,?????? ...

The clock is ticking for encryption


Computerworld - Mar 21, 2011

"All business-critical data should be encrypted at rest, especially credit card data," says Richard Stiennon at IT-Harvest, an IT security research firm in ...

VIVAnews - Musuh Baru Rezim Mesir: Facebook dan Twitter


Vivanews - Jan 29, 2011

Richard Stiennon, pengamat dari IT-Harvest, menilai bahwa upaya pemerintah Mesir itu menunjukkan bahwa stabilitas pemerintahan, pengambilan kebijakan, ...

VaporStream Restores Privacy to the Enterprise with Next...


sys-con.com - Dec 20, 2010

... security expert, Richard Stiennon, chief research analyst at IT-Harvest, publisher of ThreatChaos.com security blog, and author of Surviving Cyberwar. ...

Hacking attacks on Gawker sites underscore flaws with...


TopNews United States - Dec 20, 2010

According to a `strong password' recommendation by IT-Harvest's chief research
analyst Richard Stiennon, the "best practice" is never to use a word that can ...

RÉACTION • Jester, le pirate qui n'aimait pas WikiLeaks |...


Courrier International - Dec 16, 2010

En janvier 2010, il a confié par courriel au spécialiste Richard Stiennon qu'il avait servi dans une “unité assez réputée” en Afghanistan. ...

CNews: Trend Micro ????????? Trend Micro™ Deep Security...


CNews.ru - Oct 4, 2010

... ??????????? ? ???????? ????????, ? ????? ??????????? ?????????? ??, — ??????? ??????? ???????? IT-Harvest ?????? ??????? (Richard Stiennon). ...

Five Companies That Dropped The Ball This Week


CRN - Aug 20, 2010

Security industry analyst Richard Stiennon noted that the $7.68 billion deal is the largest to date involving a security pure-play. ...

Making Sense of the Intel McAfee Purchase - PCWorld...


PC World - Aug 19, 2010

I spoke with IT-Harvest analyst Richard Stiennon for some insight on the ... With details still somewhat sketchy, Stiennon postulated that it isn't about ...

Is open source Snort dead? Depends who you ask - sourcefire,...


Australian Techworld - Jul 21, 2010

"Snort of course is widely deployed, especially within academe and the US federal government," says Richard Stiennon, chief research analyst at consultancy ...

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer