Guy Bunker

Guy BunkerGuy has over 20 years’ experience in information security and IT management. Before joining Clearswift in 2012, Guy was a Global Security Architect for HP. He has recently authored a paper on security for the Elsevier Information Security Technical Report and co-authored the European Network and Information Security Agency (ENISA) report on cloud security. Previously, Guy was Chief Scientist for Symantec and CTO of the Application and Service Management Division at Veritas.

Guy is a frequently invited speaker at conferences, including RSA, EuroCloud and InfoSec. He is a spokesperson for The Open Group’s Jericho Forum and an expert for the European Network and Information Security Agency (ENISA).

Guy is a board advisor for several small technology businesses and has published books on utility computing, backup and data loss prevention. He holds a number of US patents and is a Chartered Engineer with the IET.

Articles by Guy Bunker

JTB Hack Underscores Need For Revamp Of Cybersecurity

Following the news that Japan’s largest travel agency JTB Corp having 7.93 million passport details, home and email addresses stolen by hackers, Guy Bunker, Senior Vice President at Clearswift commented below. Guy Bunker, Senior Vice President at Clearswift: “While the company can’t blame the employee for opening the email, the company is itself to blame and …


Cyber Security: How Legal firms can Stay Vigilant against the Online Threat

Recently, the Defending Law Firms from Cyber Attack Conference saw experts from the fields of government, law and cybersecurity present their views on the rising threats in cybersecurity and offer views on how law firms can effectively protect themselves from this rising threat. Whilst speakers honed in on the specific vulnerabilities within law firms to the government’s …

Year of Connection, Attacks and Regulations

2016, the Year of Connection, Attacks and Regulations

In 2016 we will continue to see the line between personal and work blur, with an increasing amount of devices being used for both. The drive for internet attached devices in the home will see a rise in increasingly complex home networks – which risk providing an easier route for attackers that can then be …