Richard Stiennon is founder and chief research analyst at IT-Harvest Inc. He is responsible for setting strategic direction as well as editorial coverage at this independent Information Technology research firm. Richard leads IT-Harvest in its efforts to compile the first comprehensive knowledgebase of the entire IT security market. Prior to joining IT-Harvest, he was VP of threat research for Webroot Software, Inc. the leading commercial anti-spyware solution.
Previously, Richard was VP Research at Gartner, Inc. where he covered security topics including firewalls, intrusion detection, intrusion prevention, security consulting and managed security services for the Security and Privacy group. He is a holder of Gartner's Thought Leadership award for 2003 and was named "One of the 50 most powerful people in Networking" by NetworkWorld magazine. His speaking engagements have included conferences and meetings throughout North and South America, Hawaii, Tokyo, Tel Aviv, Istanbul, Milan, Munich, Hannover, Madrid, London, and Cannes.
Blog Revalidation
Compliance and Privacy is under new management and is currently revalidating permissions from the authors of the blogs that it aggregates. This is a cyclical process.
As part of the process we do not serve blogs whose permissions are being revalidated and serve this notice instead. As soon as revalidation is complete the blog will be served, or reference to it will be removed, according to the permissions and requests received
Complete list of Bloggers featured by Compliance and Privacy:
Please note: Blogs contain items that are the responsibility of the author and are presented "as is" with no endorsement from, nor editing by, nor approval from complianceandprivacy.com. The copyright owner for the blog items is that of the originator of the item. Each blog item is reproduced from the relevant feed from the originating blog, either in full or in part as that feed itself determines. All blog item header links lead directly to those items on the original blog. Blogs are dynamic. We offer them in good faith, but, where the content is outside our control we cannot be responsible for their errors, omissions or other conduct. Some of the links on this page remain on this site, others go to other sites; that is the nature of a blog. When you leave this site you are encouraged to be aware of the privacy policy of the new site before leaving personal data there.
This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.