News By Tag
News By Location
Follow on Google News
Cybersecurity CISO Consultant/Analyst Bill Bonney Joins FHOOSH Advisory Board
Software developer creates solutions that boost both system performance and security
By: FHOOSH, Inc.
With its patent-pending data fragmentation, encryption and dispersion methodology, the FHOOSH security approach not only provides superior protection over today's encryption, but is also up to eight times faster than even storing data unprotected. The software-based platform protects data from the edge to the cloud, both in transit and at rest. Using FHOOSH, enterprises can also realize fast migration and backup/archive entire data stores to public, private and hybrid clouds.
"I saw right away how FHOOSH solutions would clearly address top C-Suite security concerns, especially with regard to the need for speed," commented Bill Bonney. "A key strategy to boost security adoption is to minimize the negative effects of having security turned on by default. Today's encryption usually slows down applications and data, and that affects adoption and usage rates. With FHOOSH, applications actually perform better, and become faster and safer at the same time."
FHOOSH CEO Eric Tobias noted, "Along with Bill's incredible background as a proven Information Security expert and CISO resource, he has a gift for explaining complex technical concepts in everyday language. We also look forward to tapping his identity management expertise for our upcoming user and key management solutions that close the security loophole created when encryption keys are treated as second-class citizens."
Bonney possesses a practical mix of business acumen and hands-on technical expertise, enabling him to address CISO challenges concerning security architecture development and implementation. In addition to his principal analyst work with San Diego-based TechVision Research, Bonney co-authored the influential "CISO Desk Reference Guide," and founded the eCyber Advisory Group to realize the "Virtual CISO" model for experts to either run information security teams or guide individuals in their roles. Bonney's Internet of Things (IoT) work with San Diego's CyberHive industry association also meshes well with FHOOSH plans. Current work with the San Diego CISO Round Table, ISACA and the IS Literacy Project, along with his previous information security positions with Intuit and others further underscore Bonney's cybersecurity and identity management expertise.
FHOOSH cybersecurity delivers fast performance with advanced data protection, so organizations no longer need to compromise speed for security. FHOOSH safeguards organizations' critical business and customer data from cyberthreats by storing it in a state that is worthless to hackers, and it does so up to eight times faster than even storing data unprotected. With the system's patent-pending security built in from architecture to implementation, hackers get only data "dust" instead of information "diamonds," and FHOOSH customers benefit from certified, extremely fast performance. Validated by leading cybersecurity firms, the FHOOSH software platform features drop-in implementation for both new and existing infrastructure to protect and power valuable data for corporations, institutions and government. For more information, visit our website (https://fhoosh.com).
Trudy Edelson, FHOOSH, Inc.