Not exact matches
Exploiting vulnerabilities found in ArcSight's source code could render it incapable of detecting that the
military's network was under attack, said Allen Pomeroy, a former ArcSight employee who helped customers build their
cyber defense
systems.
Similarly, IAI seeks to develop elite
cyber security technologies for critical
military and civilian
systems that are part of its
cyber operations, which are strategic growth engines for IAI.
Professional Summary 19 years online teaching and course development experience for information technology,
cyber and homeland security, software and
systems engineering, and
military science.