The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreRisk and risk management should be a driving force within IT departments. However, for most enterprises, risk management is considered a tax…
Read MoreRisk, and risk management, should be a driving force within IT departments. However, for most enterprises, risk management is a tax levied…
Read MoreIn 2020, global email usage will top 300 billion messages sent, according to technology market research firm The Radicati Group. And that…
Read MoreWe covered Area1 Security in our 2018 Phishing Landscape. The company has continued its upward trajectory and holds a strong position in…
Read MorePhishing is the primary method for breaching businesses. According to a 2018 Verizon Data Breach report, 96% of all attacks begin with…
Read MoreWe covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium was…
Read MoreThe role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on them.…
Read MoreDeception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and lures.…
Read MoreBug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to secure…
Read MoreIn this episode of Right Size Security, Simon and Steve discuss bug bounties, penetration testing, some of the tools used to conduct…
Read MoreIn this episode, Simon and Steve discuss what ABA or next-gen SIEMs tell you, how they evolved, and what you need to…
Read MoreIn this episode of Right Size Security, Steve and Simon discussion deception technology. Why do you want it? What are the cost…
Read More