The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreInformation security touches every aspect of our digital lives in unpredictable and often unintuitive ways. We are all expert in understanding what…
Read MoreThe enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises traditional…
Read MoreTechVets is a newly launched social enterprise in the UK, which “provides a bridge for veterans and service leavers into cyber security…
Read MoreUnless you avoided reading or listening to the news last year (and with everything going on in the world who can blame…
Read MoreOnly a fool would dare criticise the report “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” coming as it does…
Read MoreIn the land of lies, damned lies and statistics, the insurance industry may be one of the more trustworthy sources. After all,…
Read MoreRecently I’ve been asking friends, colleagues and clients what they think are the most important unanswered questions in tech. I thank Ian…
Read MoreGet the latest strategies in enterprise mobility, security, BYOD, and deployed devices in our 45 minute Twitter chat #MobilityTalk on 12/7 at 1:00…
Read MoreArtificial Intelligence (AI) presents a significant opportunity to solve problems previously either not easy to solve or worse, not possible to solve.…
Read MoreSince Stuxnet, attacks have become more dangerous…
Read MoreFinalCode has some dire predictions for those dealing with evolving infosec threats…
Read MoreA couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company…
Read MoreHowever, with DDoS attacks, there is a common theme, one established in the reality that there is not much difference between a 300 Gbps, 500 Gbps and a 1 Tbps attack…
Read MoreInformation system breaches are bad enough. However, breaches that go undetected prove to be much worse. Take for example Yahoo’s revelation that…
Read MorePasswords have become a necessary evil and many users complain about the burden of coming up with complex passwords, and the even bigger challenge of remembering those passwords.…
Read MoreNetMotion seems to take a different approach than other mobile security vendors by incorporating full end to end control over the device, the user, and the application.…
Read MoreLong term, who wins: the cryptographers or the code breakers? Nobody breaks codes anymore, strictly speaking. When you hear about broken crypto,…
Read MoreWhy do you believe it is important to have open source security software? Wouldn’t that make it easier for hackers to crack…
Read MoreSimply put, enterprises need better tools to deal with the trinity of compliance, governance, and risk.…
Read MoreYou have written that there is no effective law enforcement to counter or punish cybersecurity attackers and hackers. How do you envision…
Read MoreHowever, the cloud in the form of hosted and managed services has started to meet the processing needs of SIEM solutions, and has helped to democratize access to the high end technology that makes SIEM effective.…
Read MoreWhat do you consider to be the biggest challenges facing cybersecurity today? Some of the challenges are: not enough information security staff. This…
Read MoreWith the realization that code-signing certificate misuse is on the rise…
Read MoreHow do you draw the line between prosecuting a robot that does harm and its creator? Who bears the burden of the…
Read More