Antimalware and Virtual Machines: square peg, round hole problems
As endpoints are virtualized, it is tempting to assume that everything within the endpoint ...
May 29, 2014
Is Your Security Losing to Marketing Jiu-Jitsu?
We see, day after day, real and so-called security experts announcing the newest security ...
May 06, 2014
Stop the Delusion: Security Compliance isn’t Synonymous with Bullet-Proof Security
The ongoing history of credit card breaches at major card processing organizations ...
VDI, Security and Keeping your Sanity
In a recent post about new technology paradigms for SME we have been trying to provide ...
Apr 16, 2014
Virtualizing desktops – the drivers may not be what you expect
The driver behind server virtualization is clearly cost savings, while agility and ...
Government and Virtualization: What a Denmark municipality expects for security
Governments, federal, state/provincial and municipal, always face mounting costs when it ...
Mar 26, 2014
Virtual Patching Part II: What Makes It So Darn Tricky?
In my last blog post I began a conversation about virtual patching. In this post, I’ll ...
Mar 17, 2014
Virtual Patching is What, exactly?
I have read quite a bit about virtual patching over the years. Asking Google for a ...