Articles by Scott
Activity
-
Super excited to share my final report of 2024—diving into what I believe will be the next big opportunity in cybersecurity. Let me walk you through…
Super excited to share my final report of 2024—diving into what I believe will be the next big opportunity in cybersecurity. Let me walk you through…
Liked by Scott Solomon
-
An analysis from Microsoft published in October found that a network made up of thousands of TP-Link routers had been "compromised" by numerous…
An analysis from Microsoft published in October found that a network made up of thousands of TP-Link routers had been "compromised" by numerous…
Liked by Scott Solomon
Experience
Education
Licenses & Certifications
-
Certified Information Privacy Manager (CIPM)
IAPP - International Association of Privacy Professionals
Issued ExpiresCredential ID 0002757401
Volunteer Experience
Publications
-
Identifying and Eliminating Employee Offboarding Inefficiencies and Security Threats
The BetterCloud Monitor
Offboarding is a vital operation for any organization. Performing the process the wrong way can turn a routine "checklist" task into a serious complication. Offboarding without any semblance of strategy is sheer negligence and will lead to productivity losses, security breaches, compliance concerns, or excessive costs (many times, it's all of these issues combined).
Today, in the modern working world, there are more complexities than ever. Offboarding isn't as simple as it once was…Offboarding is a vital operation for any organization. Performing the process the wrong way can turn a routine "checklist" task into a serious complication. Offboarding without any semblance of strategy is sheer negligence and will lead to productivity losses, security breaches, compliance concerns, or excessive costs (many times, it's all of these issues combined).
Today, in the modern working world, there are more complexities than ever. Offboarding isn't as simple as it once was. There are more applications that IT must control, more roadblocks that HR, Finance, and department managers, and it has never been simpler to access company data.
To change this, you need precision, accuracy, and speed. You need an error-proof process that works immediately and secures data within seconds. You need a process that takes minutes to set up and seconds to execute.
Organizations can no longer treat this critical operation with such aloofness. This whitepaper is the best guide yet to get you started down the path toward secure and orchestrated offboarding. -
Protecting Google Drive Data: 5 Critical Requirements for Data Loss Prevention
The BetterCloud Monitor
Data breaches are occurring at an alarming rate. As a result, the demand for Google Drive Data Loss Prevention (DLP) solutions is at an all-time high. There are many vendors that offer DLP for Google Drive, including BetterCloud, so how do you choose the best one?
In this whitepaper, you'll learn about the technology required to protect your Drive data. You'll gain a better understanding of the five most critical capabilities of any Drive DLP solution (Auditing, Actions, Alerting…Data breaches are occurring at an alarming rate. As a result, the demand for Google Drive Data Loss Prevention (DLP) solutions is at an all-time high. There are many vendors that offer DLP for Google Drive, including BetterCloud, so how do you choose the best one?
In this whitepaper, you'll learn about the technology required to protect your Drive data. You'll gain a better understanding of the five most critical capabilities of any Drive DLP solution (Auditing, Actions, Alerting, Policies, and Reporting). -
2016 State of Cloud IT Report
The BetterCloud Monitor
The 2016 State of Cloud IT Report is the culmination of five months of research and data aggregation from many sources (Gartner, PwC, Google, Microsoft, 1,500 IT professionals, etc.). Through data, the report tells the story of the shift to cloud IT, and how it’s affecting workplaces around the world. I’ve already spoken with several industry analysts who’ve said it’s the most comprehensive report on the SaaS ecosystem and market they’ve ever seen.
Projects
-
New Media Institute: Capstone
-
The Capstone class in the New Media Institute at UGA allows students to develop innovative mobile, social, and gaming applications. This is a hands on project that is completed over the course of one semester. My project involved working on an on website for Grady College at UGA to enhance communication between alumnus. Our concept was a specialized "LinkedIn" designed only for Grady College alumni.
Other creatorsSee project -
Grady Connect
-
The Capstone class in the New Media Institute at UGA allows students to develop innovative mobile, social, and gaming applications. This is a hands on project that is completed over the course of one semester. My project involved working on an on website for Grady College at UGA to enhance communication between alumnus. Our concept was a specialized "LinkedIn" designed only for Grady College alumni.
Honors & Awards
-
2017 Killer Content Award Winner (Category: Short-form Content)
The Demand Gen Report
The Killer Content Awards were created to honor B2B firms that have challenged the status quo and raised the bar in content creation and campaign execution.
The winners of the 2017 Killer Content Awards (known affectionately as the Finnys) represent the brands that have embraced new marketing strategies and create compelling and immersive content experiences that inform and empower their audiences. -
2014 Phoenix Award - AirWatch Blog
Public Relations Society of America - Georgia Chapter
The Phoenix Awards is an annual awards competition designed by PRSA Georgia to recognize projects and programs that demonstrate excellence.
Recommendations received
2 people have recommended Scott
Join now to viewMore activity by Scott
-
De risk your business, operational, legal/regulatory and financial exposures by understanding where your data resides and how it should be secured.…
De risk your business, operational, legal/regulatory and financial exposures by understanding where your data resides and how it should be secured.…
Liked by Scott Solomon
-
My son was just accepted to his college of choice, with a merit scholarship. I emphasized to him that what some people call luck is usually the…
My son was just accepted to his college of choice, with a merit scholarship. I emphasized to him that what some people call luck is usually the…
Liked by Scott Solomon
-
Here's another Holiday Milestone in Data Security brought to you by the fastest data security platform on Earth. 🥁........ Cyera!!!! What an…
Here's another Holiday Milestone in Data Security brought to you by the fastest data security platform on Earth. 🥁........ Cyera!!!! What an…
Liked by Scott Solomon
-
True Enterprise scale... Clasifying an Exabyte (1,000 PBs!) #cyera #NoAgents #NextGenDSPM
True Enterprise scale... Clasifying an Exabyte (1,000 PBs!) #cyera #NoAgents #NextGenDSPM
Liked by Scott Solomon
-
👀 Without full visibility into where your data resides or how it’s secured, your security posture—and reputation—are at risk. DSPM is the key to…
👀 Without full visibility into where your data resides or how it’s secured, your security posture—and reputation—are at risk. DSPM is the key to…
Liked by Scott Solomon
-
Proud to be part of a company that’s pushing boundaries in data security. It’s an exciting journey, and I’m grateful to see how my work at Cyera is…
Proud to be part of a company that’s pushing boundaries in data security. It’s an exciting journey, and I’m grateful to see how my work at Cyera is…
Liked by Scott Solomon
-
Speed and Scale in discovery and Precision in Classification. Just 3 of the reasons why Cyera is fast becoming the data security platform customers…
Speed and Scale in discovery and Precision in Classification. Just 3 of the reasons why Cyera is fast becoming the data security platform customers…
Liked by Scott Solomon
-
🤯🤯🤯 1,000 petabytes of Snowflake data accurately classified in hours… highlighting over 1 trillion sensitive records at risk for our…
🤯🤯🤯 1,000 petabytes of Snowflake data accurately classified in hours… highlighting over 1 trillion sensitive records at risk for our…
Liked by Scott Solomon
-
The world’s largest companies rely on Snowflake to store their most critical data. To protect it, they need a Data Security solution they can…
The world’s largest companies rely on Snowflake to store their most critical data. To protect it, they need a Data Security solution they can…
Liked by Scott Solomon
-
1000 Gigabytes equal 1 Terabyte 1000 Terabytes equal 1 Petabyte 1000 Petabytes equal.... What's that volume unit called? Don't google…
1000 Gigabytes equal 1 Terabyte 1000 Terabytes equal 1 Petabyte 1000 Petabytes equal.... What's that volume unit called? Don't google…
Liked by Scott Solomon
-
#dspm for Snowflake : 📈 Massive Exabyte SCALE 🚀Hyper SPEED 2PB/day for any customer! 🤑 Low COST 🎯 High PRECISION What? Yes!! All of the KPIs one…
#dspm for Snowflake : 📈 Massive Exabyte SCALE 🚀Hyper SPEED 2PB/day for any customer! 🤑 Low COST 🎯 High PRECISION What? Yes!! All of the KPIs one…
Liked by Scott Solomon
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Scott Solomon in United States
-
Scott Solomon
-
Scott Solomon
-
Scott Solomon
Managing Director & Region Head, Executive Wealth at Goldman Sachs Ayco
-
Scott Solomon
Managing Director, Global Head of Research & Evidence Lab Technology
-
Scott Solomon
Chief Operating Officer & Chief Legal Officer
125 others named Scott Solomon in United States are on LinkedIn
See others named Scott Solomon