An Overview of Virtualization Security Guidance: Part I

As virtualization adoption grows, organizations are becoming more attuned to the need to ...

3 Security Messages CEOs Want To Hear In 2015

As frustrating as it can be for IT leaders and CISOs to struggle with a lack of respect from ...

Media and Entertainment Companies: Targets for High-Profile Attacks

When it comes to security vulnerabilities and threats, you might not think about the media ...

5 CISO New Year's Wishes

Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...

Back to Basics: Virtualization as a Security Enabler (part 2)

In my last post, I explored the idea of improving information security with virtualization ...

2015 Security Spending By The Numbers

Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...

Are Healthcare Organizations Doing Enough to Ensure Security?

When you hear about the types of organizations that make it a high priority to build a ...

Security and Virtualization: Adaptation is the “new normal” [INFOGRAPHIC]

It is no secret virtualization technology is changing the datacenter landscape. The agility, ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW