CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Dr. Avesta Hojjati
Head of R&D at DigiCert
Dr. Avesta Hojjati is the Head of R&D at DigiCert, where he manages advanced development of Cyber Security products and heavily contributes to the M&A strategy. Before joining DigiCert, he was part of the Symantec product management team. At Symantec’s Web Site Security (WSS), he was responsible for a broad spectrum of product strategy, design, and development. Before Symantec, he was part of the Yahoo security team, commonly known as Paranoids. Dr. Hojjati is an author of multiple academic papers, he is commonly known for his research on side-channel attacks on medical devices and 3D printers. His research is focused on computer security & privacy, embedded systems security, reverse engineering, and applied cryptography.


Businessman holding blocks showing digital trust in cloud services
Cyber SecurityInsights

Securing the Cloud With a Digital Trust Approach

October 11, 2022
Digital trust is a necessary component of cloud adoption and overall digital transformation, enabling companies to transfer critical processes online and create new forms of inter-organization connection.
Read More
Virtual lock and key in front of hands typing on the laptop keyboard
Cyber SecurityInsights

Three Keys to a Successful Zero-trust Implementation

March 21, 2022
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
Read More

Latest

KFC Drive thru at night showing ransomware attack

KFC, Pizza Hut, and Taco Bell Ransomware Attack Shuts Down 300 Restaurants in the UK

Exterior of T-Mobile store showing data breach

T-Mobile Data Breach: Hacker Accessed Personal Details of 37 Million Subscribers

Developer working on laptop showing software supply chain attacks

Why Securing Software Should Go Far Beyond Trusting Your Vendors

Lock on hard disk showing encryption key stolen for encrypted backups

Encrypted Backups, Encryption Key Stolen From GoTo in Hack

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results