2261 Market Street, #5605
San Francisco, CA 94114-1612
Senior Product Marketing Manager Skybox Security
John Stevenson is an industry veteran with over 29 years of experience in cybersecurity. An educator, writer, broadcaster, and marketer, John has led multi-million-pound projects for the implementation of cybersecurity education and best practice. He has managed the Critical Infrastructure groups at Skybox Security, Forcepoint, and Deep Secure and has worked with Gartner, Citrix, and IBM. John’s career spans the UK, Europe, the US, Japan, and the Middle East, helping build security solutions for some of the most security-conscious organizations in the world.
A single network security misconfiguration can result in a failed audit. Learn how organizations use network security automation to reduce errors and pass compliance audits.
Manually managing network changes is time-consuming and costly. Learn how organizations use network security automation to eliminate misconfigurations and increase operational efficiency.
Learn how to comply with DORA’s requirements for EU financial entities regarding risk management, incident management, and resilience testing.
Learn how you can comply with the strategies for vulnerability and patch management set out in the Australian Cyber Security Centre Essential Eight.
Automation policies leave the team free to focus on core business activities while routine, manual, and mundane tasks are automatically, securely, and safely executed without intervention.
Learn why prioritizing the vulnerabilities that pose the most significant risk will maximize team impact and dramatically improve your security posture.
Discover what’s new in Skybox Version 13.2: Understand the probability that vulnerabilities in the organization will be exploited in the future and better manage cyber exposure.
The modern attack surface is growing exponentially. See how Cyber Asset Attack Surface Management (CAASM) helps you stay on top of the challenge and respond more...
Overwhelmed by the expansion and complexity of the modern attack surface organizations need to re-evaluate how they respond to the threat landscape and adopt a continuous...
Discover how Skybox Security customers can defend themselves from being targeted by Microsoft Outlook CVE-2023-23397
Having a complete, dynamic network model of the organization is an incredibly powerful tool when it comes to attack simulation and network path analysis.
Learn how Critical National Infrastructure (CNI) providers model network access and maintain compliance across their complex IT and OT technology stacks.
This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses.
The threat landscape ranges from quirky to outright scary. In this environment you need full visibility and context of your attack surface.