The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreAbout this Episode On Episode 102 of Voices in AI, Byron Reese discusses security and its impact on AI as a whole…
Read MoreMany organizations find themselves having to address the information security demands of their clients in addition to government regulators. Losing bids for…
Read MoreMicroservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and modularity.…
Read MoreThis report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds to…
Read MoreThe role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on them.…
Read MoreDocuments have always been part of the financial services industry. The ability to represent agreements or processes with documents is key for…
Read MoreTo ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need to…
Read MoreDeception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and lures.…
Read MoreBug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to secure…
Read MoreIT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the business…
Read MoreCybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation requires…
Read MoreAbout this Episode Episode 90 of Voices in AI features Byron speaking with Norman Sadeh from Carnegie Mellon University about the nature…
Read MoreThe ability to detect events and determine their intent — good versus bad — is crucial to information security and network defense.…
Read MoreLast week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status of…
Read MoreMobile devices have become ubiquitous within the enterprise over the last decade moving from shadow implementations to mainstream for extended communications, even…
Read MoreFollowing up on my take on the evolution of product and strategy of companies like Cohesity and NetApp, today I’d like to…
Read MoreThe saying goes, “Identity is the new security perimeter.” This changes the traditional way we think about granting users access to “granting…
Read MoreJust three weeks into 2019, Veeam announced a $500M funding round. The company is privately held, profitable and with a pretty solid…
Read MoreInformation security touches every aspect of our digital lives in unpredictable and often unintuitive ways. We are all expert in understanding what…
Read MoreThe enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises traditional…
Read MoreTechVets is a newly launched social enterprise in the UK, which “provides a bridge for veterans and service leavers into cyber security…
Read MoreUnless you avoided reading or listening to the news last year (and with everything going on in the world who can blame…
Read MoreOnly a fool would dare criticise the report “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” coming as it does…
Read MoreIn the land of lies, damned lies and statistics, the insurance industry may be one of the more trustworthy sources. After all,…
Read More