Healthcare Industry: In Need of Security Medicine
As part of an ongoing series, we’re examining the security and compliance needs and ...
Financial Services: High-risk security, by the numbers
Our latest addition to the industry-by-industry security analysis series is financial ...
SSL v3 vulnerability: this POODLE eats secure cookies
What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...
SSL v3 Vulnerability - Remedies and What You Can Do
If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...
Shadow IT and Educational Moments
One of the most serious security challenges for enterprises today is the ease with which ...
Manufacturing: Big Industry, Big Security Challenges
In this latest installment in our series of profiles on security and compliance issues and ...
Managed Service Providers: drivers for competitive advantages? Part 2
This is a continuation of my previous blog post which aims to discuss the near future ...
Shellshock is Shocking, According to Shellers
If you’ve had a few spare moments to peruse the news, and happen to do so with an eye toward ...
Continuous Security Monitoring in a Continuous World
In today’s highly virtualized environments, where continuous integration and deployment are ...
Think like a Dev, act like an Op and harness Security – Part One
Creating software is a perpetual journey. Just like relationships, technologies start young ...
Home Depot, Target, and the business of being owned
There has recently been some interesting news. It seems that The Home Depot, both in the US ...
Retail Industry Ramps Up Efforts to Boost Security - and How the Channel Can Play a Role
As we mentioned in the last post, over the coming months we’ll be looking at the unique ...


