Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Verizon Data Breach Report: Organizations Need to Do More Security Work

Apr 28 by Robert Krauss

Organizations could be doing a lot more to prevent information security breaches. That’s one of the key findings of Verizon Enterprise Solutions’ 2015 Data Breach Investigations Report

Read More

RSA Conference 2015: DevOps Security Comes of Age

Apr 22 by George V. Hulme

When the term DevOps was first seen on the horizon of enterprise IT in 2009, it was largely questioned how enterprise IT security teams could keep up with such environments.

Read More

Hey Big Spenders… Security Getting Some Needed Funding

Apr 15 by Robert Krauss

In a recent post we covered the potential problem of workers and managers at organizations becoming increasing disengaged from information security efforts as major data breaches become more common occurrences and take on an air of inevitability.

Read More

U.S. Signals Sanctions for Cyber Attacks, but Questions Remain

Apr 14 by George V. Hulme

Recently the U.S. government added a tool to the toolset it can use against those who attack US-based systems and data.

Read More

MRIs Prove Security Warnings Push Our Brains' Pause Buttons

Apr 07 by Ericka Chickowski

Perhaps the poor users have been maligned for all these years after all. Security pundits have long decried enterprise and consumer users' tendency to clickety-click their way right through important security warning screens without ever paying heed to the content of the warning. It's a propensity that leaves their machines vulnerable to misconfigurations, makes them easy targets for dangerous attacks that still require user input to download malicious content and otherwise clears the path for all nature of endpoint-oriented social engineering.

Read More

Ensuring Security in the VDI Environment

Apr 01 by Robert Krauss

Virtual desktop infrastructure (VDI) and the concept of desktop virtualization have become a key part of the IT strategy at a growing number of organizations, as they come to realize the many potential benefits of the technology.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month