The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreIT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the business…
Read MoreJon Collins speaks with Liz Rice on the use of DevOps in building Security Platforms. Jon Collins speaks with Liz Rice on…
Read MoreCybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation requires…
Read MoreIn this episode of Right Size Security, Simon and Steve discuss bug bounties, penetration testing, some of the tools used to conduct…
Read MoreIn this episode of Voices in Cloud, David speaks with Wendy Nather of CISCO about her more than 30 years in IT…
Read MoreIn this episode, Simon and Steve discuss what ABA or next-gen SIEMs tell you, how they evolved, and what you need to…
Read MoreAbout this Episode Episode 90 of Voices in AI features Byron speaking with Norman Sadeh from Carnegie Mellon University about the nature…
Read MoreIn this episode of Right Size Security, Steve and Simon discussion deception technology. Why do you want it? What are the cost…
Read MoreThe ability to detect events and determine their intent — good versus bad — is crucial to information security and network defense.…
Read MoreLast week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status of…
Read MoreIn this episode of Right Size Security, analysts Steve Ginsberg and Simon Gibson discuss building a security program at the CSO level.…
Read MoreIn this episode of Right Size Security, analysts Steve Ginsberg and Simon Gibson discuss building a security program at the CIO level.…
Read More