3rd Party Risk Management , Application Security , DevSecOps

Harnessing the Power of Open Source to Protect Networks

Corelight CEO Brian Dye on Why Network Visibility Is Challenging for Smaller Firms
Brian Dye, CEO, Corelight

Organizations face major challenges gaining visibility into networks that grow more complex by the day, and Corelight CEO Brian Dye says the open-source community can help with gathering evidence and insights from networks so that the perimeter is better secured.

See Also: OnDemand | Secure Your Vendor's Access from Attacks on Third-party Vulnerabilities

In a video interview with Information Security Media Group at RSA Conference 2022, Dye also discusses:

  • How the open-source community can help protect networks;
  • The unique challenges smaller firms face around network visibility;
  • The importance of applying an evidence-based strategy.

Dye is a veteran of the security industry, with a breadth of leadership experience across scaled and newly developed product lines including infrastructure security, information security, cloud security services and security management. He joined Corelight from McAfee, where he was executive vice president of the Corporate Products Group, leading the global corporate security product portfolio. Prior to that, he led the Mobile Platforms Group at Citrix and spent more than a decade at Symantec.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.