The State of Endpoint Security in Virtual Environments
There’s no question that the majority of organizations are virtualizing servers, and ...
Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)
Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...
“AV is dead”: declarations and language
There has been quite a bit of marketing effort put into declaring that AV is dead. It is ...
Advanced Persistent Threats – Silver Bullets That Fail
This is the second post from a series we thought necessary to dedicate to APTs (Advanced ...
APTs and the next generation security - technology facelift or real innovation?
This is the first post in a series dedicated to the trendiest, most disputed and most used ...
Security Solutions Offer MSPs a Great Opportunity for Business Growth, But Service Providers Must Address the Licensing Issues
Managed services providers (MSPs) are experiencing a world of change these days, as cloud ...
DevOps and SecOps – the Impossible Conciliation?
When dealing with greatness and great companies one should try to find out what it is that ...
Count your blessings: Cloud options for Disaster Recovery
You are part of an industry leading organization with thousands of customers, but do you ...
When Amazon Zigs, Everyone Else Zigs and Zags
For the most part, corporate press releases are boring. It’s an exercise in patting oneself ...
Antimalware and Virtual Machines: square peg, round hole problems
As endpoints are virtualized, it is tempting to assume that everything within the endpoint ...
Is Your Security Losing to Marketing Jiu-Jitsu?
We see, day after day, real and so-called security experts announcing the newest security ...
Stop the Delusion: Security Compliance isn’t Synonymous with Bullet-Proof Security
The ongoing history of credit card breaches at major card processing organizations ...


