Media and Entertainment Companies: Targets for High-Profile Attacks

When it comes to security vulnerabilities and threats, you might not think about the media ...

5 CISO New Year's Wishes

Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...

2015 Security Spending By The Numbers

Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...

Shedding light on the long IT Shadows

The tech industry – and especially info security– love their acronyms and buzzwords: cloud, ...

Many SMBs are not in the business of IT, but need cloud more than ever

The National Small Business association published a report, the “2013 Small Business ...

It's 1 a.m. – Do You Know Where Your Data Is?

Cloud computing provides us with many benefits. It allows us to scale services quickly in ...

Don’t Let the Internet of Things Catch You by Surprise

You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Think like a Dev, act like an Op and harness Security – Part One

Creating software is a perpetual journey. Just like relationships, technologies start young ...

Sex, Photos, and the Shared Security Model

Recently, there has been quite a bit of media coverage about some sensitive, private ...

Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling

In my previous post I raised a flag around the importance of identity and access management ...

Aug 20, 2014

VARs and MSPs: Keeping Up on the Changing Times

The IT industry has long been characterized by change. You might remember the dominance of ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW