3 Cloud Security Truths For CISOs

As cloud initiatives shift from cost savings efforts to strategic transformations of IT and ...

Why Aurora is more than a sunrise

A short while ago, Amazon announced a new offering called Aurora. In a nutshell, Aurora is a ...

Identity and Access Management as a Service (IDaaS) – mastering the fine art of juggling

In my previous post I raised a flag around the importance of identity and access management ...

Who is Getting Cloudy?

There are many questions about cloud; what is it, where is it, and who’s using it? The ...

Distributed Denial of Service in the Cloud or the ‘New Black’ of cyber-criminals

Distributed Denial of Service (DDoS) attacks have started to grow in intensity and ...

The advantages of “Baking in” antivirus in your model on Amazon Web Services (AWS)

As an AWS customer, chances are you made a great business decision to move to that model for ...

The ‘Near Future’ and Business Alignment of Security for Managed Services

In the most recent post, I described both the challenges and the opportunities that are ...

DevOps and SecOps – the Impossible Conciliation?

When dealing with greatness and great companies one should try to find out what it is that ...

When Amazon Zigs, Everyone Else Zigs and Zags

For the most part, corporate press releases are boring. It’s an exercise in patting oneself ...

Desktop-as-a-Service: New Opportunities for the Channel

Desktop-as-a-service (DaaS), yet another “as-a-service” offering made possible by the cloud, ...

Desktop-as-a-Service (DaaS): when traditional security just won’t cut it

Destkop-as-a-Service (DaaS) is on the rise in terms of adoption and maturation. You just ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW