Cloud is Driving Shadow IT Amongst End-users and Datacenter Users
Not long ago, I presented a webinar on BrightTalk about cloud and BYOD (Bring Your Own ...
Could Industry Follow DoD Cloud Security Lead?
Even the U.S. Department of Defense admits that cloud security worries shouldn't come in the ...
Anthem breached by remote attack, 80 million records at risk
Anthem, one of the largest health insurers in The United States, has announced they have ...
An Overview of Virtualization Security Guidance: Part I
As virtualization adoption grows, organizations are becoming more attuned to the need to ...
3 Security Messages CEOs Want To Hear In 2015
As frustrating as it can be for IT leaders and CISOs to struggle with a lack of respect from ...
Media and Entertainment Companies: Targets for High-Profile Attacks
When it comes to security vulnerabilities and threats, you might not think about the media ...
5 CISO New Year's Wishes
Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...
Back to Basics: Virtualization as a Security Enabler (part 2)
In my last post, I explored the idea of improving information security with virtualization ...
2015 Security Spending By The Numbers
Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...
Are Healthcare Organizations Doing Enough to Ensure Security?
When you hear about the types of organizations that make it a high priority to build a ...
Security and Virtualization: Adaptation is the “new normal” [INFOGRAPHIC]
It is no secret virtualization technology is changing the datacenter landscape. The agility, ...
Back to Basics: Virtualization as a Security Enabler (part 1)
The news these days in security is mostly “doom and gloom”. Just consulting a site like ...


