It's 1 a.m. – Do You Know Where Your Data Is?
Cloud computing provides us with many benefits. It allows us to scale services quickly in ...
4 Things You Should Know Before Running A Botnet
1) They understand what they are doing Herding a botnet isn’t easy these days. The people ...
Revisiting the “Goldilocks Zone”: Moving toward the virtual data center
There is no question that the footprint of today’s data center is rapidly moving toward the ...
A ‘Teachable Moment’ for VARs and MSPs: Security in the Education Sector
The next entry in our ongoing series covering industry-specific security issues is the ...
Don’t Let the Internet of Things Catch You by Surprise
You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...
Healthcare Industry: In Need of Security Medicine
As part of an ongoing series, we’re examining the security and compliance needs and ...
Financial Services: High-risk security, by the numbers
Our latest addition to the industry-by-industry security analysis series is financial ...
SSL v3 vulnerability: this POODLE eats secure cookies
What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...
SSL v3 Vulnerability - Remedies and What You Can Do
If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...
Shadow IT and Educational Moments
One of the most serious security challenges for enterprises today is the ease with which ...
Manufacturing: Big Industry, Big Security Challenges
In this latest installment in our series of profiles on security and compliance issues and ...
Managed Service Providers: drivers for competitive advantages? Part 2
This is a continuation of my previous blog post which aims to discuss the near future ...


