Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Henry Harrison
LinkedIn
RSS
E-Mail

Profile of Henry Harrison

Co-founder & Chief Technology Officer, Garrison
Member Since: 1/18/2019
Author
News & Commentary Posts: 2
Comments: 1

Henry Harrison is co-founder and CTO at Garrison, and a seasoned IT industry executive, serial entrepreneur and the brain behind Garrison's core technologies. Henry has a background in leading the development of innovation in cyber security and Garrison was founded to create a unique way to protect organizations from cyberattacks that come from employees accessing the Internet.

In his current role, and in his previous role as technical director for cybersecurity at BAE Systems, Henry has worked closely with customers across numerous industries, as well as with high-security parts of governments, to design and deploy new cybersecurity technologies. After spending several years focused on developing and delivering advanced monitoring and incident response capabilities, Henry created Garrison's ultra-secure web browser to make a real difference to the fundamental protection of sensitive enterprise systems and data.

Henry has a first-class physics degree from Oxford and a asters in Electronic Engineering.

Articles by Henry Harrison
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20834
PUBLISHED: 2020-06-04
An issue was discovered in Foxit PhantomPDF before 8.3.10. It allows signature validation bypass via a modified file or a file with non-standard signatures.
CVE-2019-20835
PUBLISHED: 2020-06-04
An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It has homograph mishandling.
CVE-2019-20836
PUBLISHED: 2020-06-04
An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It has mishandling of cloud credentials, as demonstrated by Google Drive.
CVE-2019-20837
PUBLISHED: 2020-06-04
An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It allows signature validation bypass via a modified file or a file with non-standard signatures.
CVE-2019-20823
PUBLISHED: 2020-06-04
An issue was discovered in Foxit PhantomPDF before 8.3.11. It has a buffer overflow because a looping correction does not occur after JavaScript updates Field APs.