5 CISO New Year's Wishes
Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...
Back to Basics: Virtualization as a Security Enabler (part 2)
In my last post, I explored the idea of improving information security with virtualization ...
2015 Security Spending By The Numbers
Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...
Are Healthcare Organizations Doing Enough to Ensure Security?
When you hear about the types of organizations that make it a high priority to build a ...
Security and Virtualization: Adaptation is the “new normal” [INFOGRAPHIC]
It is no secret virtualization technology is changing the datacenter landscape. The agility, ...
Back to Basics: Virtualization as a Security Enabler (part 1)
The news these days in security is mostly “doom and gloom”. Just consulting a site like ...
No Getting Around It: Security is Vital for Transportation Sector
Transportation is one of those industries that affects everyone in the world just about ...
For retailers: 2014 has been the flagship of security blunders
As we enter the busiest and most lucrative period of the year for retailers, it’s a good ...
Shedding light on the long IT Shadows
The tech industry – and especially info security– love their acronyms and buzzwords: cloud, ...
Sony’s Big Takeaway
As a reporter, I’ve covered many breaches over the years. Attacks of the magnitude we’re ...
The Next Cloud Frontier: True Software-Defined Security
In last post of this series, I described what a Software-Defined Data Center (SDDC) is, and ...
Protecting the Grid: Utilities and Energy Companies Need to Be Smart About Security
In this latest installment of our series on security issues in a variety of industries, we ...


