Don’t Let the Internet of Things Catch You by Surprise
You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...
Shadow IT and Educational Moments
One of the most serious security challenges for enterprises today is the ease with which ...
Think like a Dev, act like an Op and harness Security – Part One
Creating software is a perpetual journey. Just like relationships, technologies start young ...
Sex, Photos, and the Shared Security Model
Recently, there has been quite a bit of media coverage about some sensitive, private ...
Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling
In my previous post I raised a flag around the importance of identity and access management ...
VARs and MSPs: Keeping Up on the Changing Times
The IT industry has long been characterized by change. You might remember the dominance of ...
Like Many Businesses, Agriculture Needs to Centralize Security Too
When we think of farming and agriculture, we tend to think of dirt, maybe some animals, and ...
Who is Getting Cloudy?
There are many questions about cloud; what is it, where is it, and who’s using it? The ...
Not Planning for SMAC? Maybe You Should Be
As a managed services provider (MSP) or value-added reseller (VAR), you’re no doubt keenly ...
Distributed Denial of Service in the Cloud or the ‘New Black’ of cyber-criminals
Distributed Denial of Service (DDoS) attacks have started to grow in intensity and ...
The advantages of “Baking in” antivirus in your model on Amazon Web Services (AWS)
As an AWS customer, chances are you made a great business decision to move to that model for ...
The ‘Near Future’ and Business Alignment of Security for Managed Services
In the most recent post, I described both the challenges and the opportunities that are ...