Context versus isolation: solving one of security’s trickiest problems

Securing endpoints has always required balancing context and isolation. Context is about ...

Ensuring Security in the VDI Environment

Virtual desktop infrastructure (VDI) and the concept of desktop virtualization have become a ...

Enterprises Hold High Authentication Hopes for Software-Defined Perimeters

As we head into RSA next month, chances are high that software defined perimeter (SDP) will ...

Security as a Business Enabler: The Long View, from the trenches

Much has been said in the last five years about how security “needs a seat at the business ...

An Overview of Virtualization Security Guidance: Part II

In the first post of this two-part series, I described security guidance regimes and tools ...

Cloud is Driving Shadow IT Amongst End-users and Datacenter Users

Not long ago, I presented a webinar on BrightTalk about cloud and BYOD (Bring Your Own ...

An Overview of Virtualization Security Guidance: Part I

As virtualization adoption grows, organizations are becoming more attuned to the need to ...

5 CISO New Year's Wishes

Back to work, people! It's time for CISOs to dust the holiday cookie crumbs from their lips ...

Back to Basics: Virtualization as a Security Enabler (part 2)

In my last post, I explored the idea of improving information security with virtualization ...

Security and Virtualization: Adaptation is the “new normal” [INFOGRAPHIC]

It is no secret virtualization technology is changing the datacenter landscape. The agility, ...

Back to Basics: Virtualization as a Security Enabler (part 1)

The news these days in security is mostly “doom and gloom”. Just consulting a site like ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW