Scott Raspa

Author image
Scott Raspa

Raspa oversees all business development and marketing from strategy development to execution. He has 12 years of technology marketing and sales experience in high-growth analytics and security companies. Raspa earned a Bachelor of Science in information systems management from the University of Maryland University College.

  • multi-tenancy_Slide1

    IKANOW 2.0 Delivers First Customizable Information Security Analytics Platform

    A Solution Built on Scalable, Lightning Fast Open Source Technologies, Packaged for Rapid Implementation and Multi-tenant configuration Reston, VA — IKANOW today announced the first fully customizable information security analytics platform with enterprise scalability and multi-tenancy. There are many packaged solutions that claim big data analytics capabilities but simply don’t meet the scalability requirements of large enterprises nor do they allow for easy customization that companies need. Built on open sources technologies, IKANOW meets enterprise requirements for both scalability and ease of customization. IKANOW’s 2.0 release also has an extensive…

  • ikanow-take-back-control-video

    Video: Take Back Control of Your Information Security

    The numbers are staggering. PWC reported there were 60 million information security attacks on enterprises last year and CyberEdge Group found over 70% of all companies were breached. The attack surface has expanded rapidly as the number of managed devices increased another 72% over 2014 according to Cisco. According to IBM and CSO, the typical enterprise has between 60-85 information security tools to manage.  It’s no wonder information security teams feel like they have less control. Click the video below to learn more. If you would like to go deeper…

  • IKANOW Take Back Control of Your Information Security White Paper

    White Paper: Why Infosec Pros Feel a Loss of Control and How to Get It Back

    Information Security has always been a tough job. All defenses have cracks and attackers know more about you than you do about them. Everyone recognizes the challenge is increasing each year. There are three trends driving this situation and causing information security professionals to feel like they have less control than ever before: A rapidly expanding attack surface to defend The continued rise in both attack volume and sophistication The growing number of installed information security security tools that create data silos and increased reliance on vendors The IKANOW team…

  • Ransomware-attacks-increase-768x542


    Ransomware has certainly captured the attention of the media and hospitals across the country.  The poster child of this trend is Hollywood Presbyterian Medical Center (HPMC) in Los Angeles. Earlier this year, HPMC was the victim of a Ransomware attack and paid $17,000 to get the key and access their files again. More recently, the 10-hospital Medstar system in the Washington, DC area was attacked and asked for 45 bitcoins (about $18,500), although the hospital claims to have restored its data without paying the ransom. In between these attacks, three…

  • ransomware-targets-hospitals

    First Quarter Breach Report – 2016

    2015 was a record year for cybersecurity hacks with 3,930 data breach incidents reported. If the number of records compromised so far this year is any indication, 2016 is on pace to be another record-breaking year. The first quarter of 2016 saw a 6% increase in the number of records compromised over the same time period in 2015 and some new trends. The top dozen breaches of Q1 2016 include: New Trends Emerge In addition to a rise in records exposed, there are four key trends associated with first quarter…

  • most-important-reasons-for-securing-sensitive-data

    Will Compliance-Driven Investment Help or Hinder Information Security?

    If information security is your objective, compliance should not be your north star. However, data show that for most organizations compliance is the driver of information security investment. That means compliance is also the objective and information security is not necessarily the intended outcome. Data from the 2016 Vormetric Data Threat Report show that although 91% of survey participants were concerned about the security of their data and 61% had experienced a data breach, only 21% “cited a past data breach as a reason for securing sensitive data.” You would…

  • 2-jpeg

    50% of Information Security Professionals Lack Confidence in Their Security Solutions – no surprise there

    Barkly recently released a survey of 350 IT professionals to gauge their confidence in the existing information security infrastructure. One key finding is that 50% have confidence in their current security posture. According to Barkly researchers, that means 50% are not confident. A Dark Reading article reported that Barkly co-founder and CTO Jack Danahy “found it startling that such a large number of respondents in the survey don’t trust their security solutions. ‘Around half of the people we talked to don’t have confidence in the choices that they’ve already made,’…

  • March 14-2016 Featured

    Should We Celebrate that Breach Dwell Time is Now “Only” 21 Weeks?

    Mandiant recently released it annual The State of Cyber Attacks report and there is some potentially good news for the industry. A surface reading of the numbers shows that the time for an enterprise to become aware of a breach (note the careful word choice here) fell 29% in 2015 to 146 days. Reducing breach detection time by nearly two months is a move in the right direction. But how excited should we be? There are two problems with this number. 53% of breaches actually had a 320-day average dwell…

  • network-security-acquisitions

    Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016

    The Cyberthreat Defense Report that came out two weeks ago includes survey results from over 1000 IT security professionals. The survey found next generation firewall, threat intelligence, user behavior analytics and information security analytics are the top four technologies slated for acquisition in 2016. Two of the four named technologies are analytics-based and one is in IKANOW’s sweet spot. This isn’t surprising to us as we see the uptick in demand for Security Analytics. The proliferation of both internal and external security data combined with the tiny footprints of sophisticated…

  • cyberthreat-defense-report-cover

    36-page 2016 Cyberthreat Defense Report Available for Download

    Researchers at CyberEdge Group today released the 2016 Cyberthreat Defense Report. You can download a complementary copy of the 36-page report that includes more than 30 charts and data tables below. The report is based on a survey of over 1,000 IT Security professionals in 10 countries. Some of the findings include: Percent of companies that were breached in 2015 Percent of companies expecting to be breached in 2016 Breakdown of companies by number of successful breaches in 2015 Top network security technologies currently in use Top security technologies planned…