Press

Read the stories that have been published in industry magazines.  

Partners: Symantec’s Blue Coat Acquisition Lays Foundation For More Stable, Forward-Looking Security Vendor | CRN.com

Steve Barone, president and CEO of Ferndale, Mich.-based CBI, said that combination of capabilities will “add value” to the Symantec portfolio for partners that have already invested in the portfolio. “This is going to be a brilliant merger of technologies,” Barone said. … While Symantec leadership had been talking seriously about making acquisitions since its […]
Posted on
Posted in News, Press

Atlanta Business Radio

Ryan Redhawk of Atlanta Business Radio interviews Mike Pearson of CBI about cyber threats, CBI, the CBI Academy. Listen to Mike Pearson’s snippet Listen to the full show at http://atlantabusinessradio.businessradiox.com/  
Posted in News, Press

IoT Security: New Vulnerabilities | Embedded Systems Engineering

Article by CBI’s CEO, Steve Barone As apps proliferate, are security practices finding their place in the workflow? The Internet of Things (IoT) has already brought new levels of connectivity and engagement into the lives of so many, yielding everything from small conveniences to extraordinary automation, personalization and efficiency. But new technologies inevitably bring new […]
Posted in News, Press

Digital, Science, Tech Pursuits Drive Corp! Award Winners | Corpmagazine.com

As the name suggests, DiSciTech Awards recognize innovation in the digital, science and technology sectors. Winners will gather for an awards ceremony April 7 at VisTaTech Center on the Schoolcraft College campus in Livonia. CBI was recognized as one of the Digital Award Winners of the 2016 DiSciTech Awards from Corp! Magazine. Read the full […]
Posted on
Posted in News, Press

Security Culture in Development: An Interview with Wolf Goerlich | Channel 9

Join Technical Evangelist, Annie Bubinski, for an interview with Wolf Goerlich (@jwgoerlich), who presented this year at CodeMash 2016 about Security Culture in Development.     Originally posted on Channel 9.  
Posted in News, Press
Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/24IZGnkroo https://t.co/y0JscoHQZu
Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/Kbok13axkk https://t.co/R1FcepSgpl
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/pT1Slvr12N by @CBI_IT
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/J4RpjKAX8P by @CBI_IT
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/Cx3fTyYps0 https://t.co/qp6db088RP
Social engineers come up with new tricks all the time, be prepared #CBIBlog https://t.co/ieYlvl2ZC5 https://t.co/w4CdZddlFM
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/zhFaFSJC5P https://t.co/sRL6Tf2gIY
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/VxiSNYxJ8V https://t.co/R33fgqvRe1
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/mcqyXhTuvP https://t.co/YbH65TlD2L
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/saGkBkqSkS https://t.co/eG6jY2Enlv
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/ZFBXs4H6gM https://t.co/BUOiBaQRPd
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/1uX5ixVXxF by @CBI_IT
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/bP3QHjUdlz https://t.co/rTmIYpXk4s
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/x7kzfK9414 https://t.co/YpnVrNIQWN
Customizing your SIEM structure can really weigh your team down #CyberSecurity #SIEM https://t.co/feJAebkqPl https://t.co/WVO7iUSUrS
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/Tt4uQ66nVc https://t.co/jfrKgErROf
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/sE9QmaKSds
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/I7q3xVrwpD https://t.co/Fm3ethdDkx
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/9BUqoWjY3o
CBI's strategic program practice can build encryption in to a security plan specific to your company #CBIBloghttps://t.co/qnfauA26bz