The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreYou have written that there is no effective law enforcement to counter or punish cybersecurity attackers and hackers. How do you envision…
Read MoreHowever, the cloud in the form of hosted and managed services has started to meet the processing needs of SIEM solutions, and has helped to democratize access to the high end technology that makes SIEM effective.…
Read MoreWhat do you consider to be the biggest challenges facing cybersecurity today? Some of the challenges are: not enough information security staff. This…
Read MoreWith the realization that code-signing certificate misuse is on the rise…
Read MoreHow do you draw the line between prosecuting a robot that does harm and its creator? Who bears the burden of the…
Read MoreAd fraud is on the rise, and nothing good will come from it.…
Read MoreIt takes a lot more than simply analyzing user activity with rules and statistics…
Read MoreThe word ‘shadow’ seems to take pride of place in this year’s Logicalis annual CIO survey, which asked questions of over 700…
Read MoreThat is when Green had an epiphany, one that amounted to realizing network performance statistics and end user expectations rarely do not go hand in hand.…
Read MoreWhile, “doing it all wrong” may be an exaggeration, no one can deny the fact that breaches are on the rise, and IT security solutions seem to be falling behind the attack curve. Yet, those looking to place blame may need only look in the mirror.…
Read MoreUnder the pressures of transition, SonicWALL hosts a successful partner event that highlights what the future holds for the embattled security vendor.…
Read MoreEven though not a prevailing type of cyber attacks, advanced persistent threats (APTs) are definitely the most devastating ones. Just like a…
Read More