CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Tim Mackey
Principal Security Strategist at Synopsys Cybersecurity Research Center
Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim applies his skills in distributed systems engineering, mission critical engineering, performance monitoring, large-scale data center operations, and global data privacy regulations to customer problems. He takes the lessons learned from those activities and delivers talks globally at well-known events such as RSA, Black Hat, Open Source Summit, KubeCon, OSCON, DevSecCon, DevOpsCon, Red Hat Summit, and Interop.


Programmer sitting at desk, drinking coffee, using computer with coding on screen showing open source security and Log4j vulnerability
Cyber SecurityInsights

Open Source Security in the Wake of the Log4j Vulnerability

February 18, 2022
While it might be tempting to view a major vulnerability as an indication of open source somehow being deficient, the reality is far from that. Open source software is not more or less secure than commercial software, and in reality, most commercial software either includes or runs on open source technologies.
Read More

Latest

Man in dark hoodie touching virtual lock showing third-party data breach

Dollar Tree Third-Party Data Breach Exposes Sensitive Data of Nearly 2 Million Employees

Hacker working at night showing hacker groups infiltrated nuclear site

Senior Staff at Sellafield Nuclear Site Accused of Covering up Breaches by Hacker Groups Dating Back to at Least 2015

Scales of justice and judge's gavel on wooden table showing data privacy laws

Crossing the Aisle on Data Privacy Laws: Explaining the Disconnect Between What People Want and What Lawmakers Pass

Finger on laptop keyboard showing Iranian hackers target water utilities

Iranian Hackers Strike US Water Utilities in Retaliation for Israel Support

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations EU GDPR Facebook
    See all results