When Moving to DevOps, Security Can Enhance the Ride
DevOps and continuous integration and deployment efforts boost productivity and agility, but ...
Sex, Photos, and the Shared Security Model
Recently, there has been quite a bit of media coverage about some sensitive, private ...
The State of Endpoint Security in Virtual Environments
There’s no question that the majority of organizations are virtualizing servers, and ...
Managed Service Providers: drivers for competitive advantages? Part 1
As mentioned in my previous blog post, the market of IT services delivered by Managed ...
When it comes to information security, not all industries are alike
Saying all types of companies have the same information security concerns because they face ...
Don’t Trivialize “Small Business” IT and Security: They Probably Have It Harder than You
I recently signed up a family member for extracurricular activities, and upon arriving at a ...
Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling
In my previous post I raised a flag around the importance of identity and access management ...
VARs and MSPs: Keeping Up on the Changing Times
The IT industry has long been characterized by change. You might remember the dominance of ...
Like Many Businesses, Agriculture Needs to Centralize Security Too
When we think of farming and agriculture, we tend to think of dirt, maybe some animals, and ...
Who is Getting Cloudy?
There are many questions about cloud; what is it, where is it, and who’s using it? The ...
Not Planning for SMAC? Maybe You Should Be
As a managed services provider (MSP) or value-added reseller (VAR), you’re no doubt keenly ...
Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)
Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...


