Don’t Let the Internet of Things Catch You by Surprise

You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Think like a Dev, act like an Op and harness Security – Part One

Creating software is a perpetual journey. Just like relationships, technologies start young ...

Sex, Photos, and the Shared Security Model

Recently, there has been quite a bit of media coverage about some sensitive, private ...

Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling

In my previous post I raised a flag around the importance of identity and access management ...

Aug 20, 2014

VARs and MSPs: Keeping Up on the Changing Times

The IT industry has long been characterized by change. You might remember the dominance of ...

Aug 14, 2014

Like Many Businesses, Agriculture Needs to Centralize Security Too

When we think of farming and agriculture, we tend to think of dirt, maybe some animals, and ...

Who is Getting Cloudy?

There are many questions about cloud; what is it, where is it, and who’s using it? The ...

Aug 12, 2014

Not Planning for SMAC? Maybe You Should Be

As a managed services provider (MSP) or value-added reseller (VAR), you’re no doubt keenly ...

Distributed Denial of Service in the Cloud or the ‘New Black’ of cyber-criminals

Distributed Denial of Service (DDoS) attacks have started to grow in intensity and ...

The advantages of “Baking in” antivirus in your model on Amazon Web Services (AWS)

As an AWS customer, chances are you made a great business decision to move to that model for ...

The ‘Near Future’ and Business Alignment of Security for Managed Services

In the most recent post, I described both the challenges and the opportunities that are ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW