Antimalware and Virtual Machines: square peg, round hole problems

As endpoints are virtualized, it is tempting to assume that everything within the endpoint ...

Is Your Security Losing to Marketing Jiu-Jitsu?

We see, day after day, real and so-called security experts announcing the newest security ...

Stop the Delusion: Security Compliance isn’t Synonymous with Bullet-Proof Security

The ongoing history of credit card breaches at major card processing organizations ...

VDI, Security and Keeping your Sanity

In a recent post about new technology paradigms for SME we have been trying to provide ...

Government and Virtualization: What a Denmark municipality expects for security

Governments, federal, state/provincial and municipal, always face mounting costs when it ...

Virtual Patching Part II: What Makes It So Darn Tricky?

In my last blog post I began a conversation about virtual patching. In this post, I’ll ...

Mar 17, 2014

Virtual Patching is What, exactly?

I have read quite a bit about virtual patching over the years. Asking Google for a ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW