How secure are my sessions? Part 2
Guest Post: Why is TLSv1.3 a better fit for Zero Trust?
CARVIEW |
Kathleen Moriarty, Founder of SecurityBiaS, technology strategist and board advisor, helps companies lead through disruption. Adjunct Professor at Georgetown SCS, also offering two corporate courses on Security Architecture and Architecture for the SMB Market. Previously, Formerly as the Chief Technology Officer, Center for Internet Security Kathleen defined and led the technology strategy, integrating emerging technologies. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honour of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group. Kathleen achieved over twenty-five years of experience driving positive outcomes across IT Strategy and Vision, Information Technology Leadership, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with Dell Technologies/EMC/RSA (Distinguished Engineer), MIT Lincoln Laboratory (Member of the Technical Staff), Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Author: Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, July 2020.
By Kathleen Moriarty on 16 Jun 2025
Guest Post: Why is TLSv1.3 a better fit for Zero Trust?
By Kathleen Moriarty on 30 May 2025
Guest Post: Breaking down TLS implementation and authentication options to support informed decision-making.
By Kathleen Moriarty on 17 Feb 2025
Guest Post: How we defend our systems has shifted. Here’s what organizations and schools need to know.
By Kathleen Moriarty on 27 Mar 2024
Guest Post: Cloud native architecture is a game changer for security at scale. How long before we see automation through attestation, built-in at scale?
By Kathleen Moriarty on 20 Mar 2024
Guest Post: Increasing encryption online impedes existing methods of detecting malicious traffic. How will industry, standards, and policy settle this dilemma?
By Kathleen Moriarty on 19 Jan 2024
Guest Post: Vetting AI LLM content in education and infosec requires a new best practice.
By Kathleen Moriarty on 15 Nov 2023
Guest Post: How will the forthcoming TLS Encrypted Client Hello changes affect your current set of defences?
By Kathleen Moriarty on 6 Jul 2023
Guest Post: New vendor guide for embedding IoT security.
By Kathleen Moriarty on 10 Apr 2023
Guest Post: Steps organizations can take to prepare for post-quantum cryptography.
By Kathleen Moriarty on 23 Dec 2022
Guest Post: Investigating the evolving levels of support for WebAuthn.