Media and Entertainment Companies: Targets for High-Profile Attacks
When it comes to security vulnerabilities and threats, you might not think about the media ...
5 CISO New Year's Wishes
Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...
2015 Security Spending By The Numbers
Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...
Shedding light on the long IT Shadows
The tech industry – and especially info security– love their acronyms and buzzwords: cloud, ...
Many SMBs are not in the business of IT, but need cloud more than ever
The National Small Business association published a report, the “2013 Small Business ...
It's 1 a.m. – Do You Know Where Your Data Is?
Cloud computing provides us with many benefits. It allows us to scale services quickly in ...
Don’t Let the Internet of Things Catch You by Surprise
You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...
Shadow IT and Educational Moments
One of the most serious security challenges for enterprises today is the ease with which ...
Think like a Dev, act like an Op and harness Security – Part One
Creating software is a perpetual journey. Just like relationships, technologies start young ...
Sex, Photos, and the Shared Security Model
Recently, there has been quite a bit of media coverage about some sensitive, private ...
Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling
In my previous post I raised a flag around the importance of identity and access management ...
VARs and MSPs: Keeping Up on the Changing Times
The IT industry has long been characterized by change. You might remember the dominance of ...


