Media and Entertainment Companies: Targets for High-Profile Attacks
When it comes to security vulnerabilities and threats, you might not think about the media ...
5 CISO New Year's Wishes
Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...
2015 Security Spending By The Numbers
Last year's non-stop parade of breaches showed CEOs and boards how detrimental a lack in ...
Security and Virtualization: Adaptation is the “new normal” [INFOGRAPHIC]
It is no secret virtualization technology is changing the datacenter landscape. The agility, ...
Back to Basics: Virtualization as a Security Enabler (part 1)
The news these days in security is mostly “doom and gloom”. Just consulting a site like ...
No Getting Around It: Security is Vital for Transportation Sector
Transportation is one of those industries that affects everyone in the world just about ...
For retailers: 2014 has been the flagship of security blunders
As we enter the busiest and most lucrative period of the year for retailers, it’s a good ...
Shedding light on the long IT Shadows
The tech industry – and especially info security– love their acronyms and buzzwords: cloud, ...
Sony’s Big Takeaway
As a reporter, I’ve covered many breaches over the years. Attacks of the magnitude we’re ...
The Next Cloud Frontier: True Software-Defined Security
In last post of this series, I described what a Software-Defined Data Center (SDDC) is, and ...
Protecting the Grid: Utilities and Energy Companies Need to Be Smart About Security
In this latest installment of our series on security issues in a variety of industries, we ...
The Next Cloud Frontier: The Security Layer in the Stack?
Based on what we’re seeing with organizations implementing heavily virtualized ...


