The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreRecently I’ve been asking friends, colleagues and clients what they think are the most important unanswered questions in tech. I thank Ian…
Read MoreGet the latest strategies in enterprise mobility, security, BYOD, and deployed devices in our 45 minute Twitter chat #MobilityTalk on 12/7 at 1:00…
Read MoreArtificial Intelligence (AI) presents a significant opportunity to solve problems previously either not easy to solve or worse, not possible to solve.…
Read MoreSince Stuxnet, attacks have become more dangerous…
Read MoreFinalCode has some dire predictions for those dealing with evolving infosec threats…
Read MoreA couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company…
Read MoreHowever, with DDoS attacks, there is a common theme, one established in the reality that there is not much difference between a 300 Gbps, 500 Gbps and a 1 Tbps attack…
Read MoreInformation system breaches are bad enough. However, breaches that go undetected prove to be much worse. Take for example Yahoo’s revelation that…
Read MorePasswords have become a necessary evil and many users complain about the burden of coming up with complex passwords, and the even bigger challenge of remembering those passwords.…
Read MoreNetMotion seems to take a different approach than other mobile security vendors by incorporating full end to end control over the device, the user, and the application.…
Read MoreLong term, who wins: the cryptographers or the code breakers? Nobody breaks codes anymore, strictly speaking. When you hear about broken crypto,…
Read MoreWhy do you believe it is important to have open source security software? Wouldn’t that make it easier for hackers to crack…
Read MoreSimply put, enterprises need better tools to deal with the trinity of compliance, governance, and risk.…
Read MoreYou have written that there is no effective law enforcement to counter or punish cybersecurity attackers and hackers. How do you envision…
Read MoreHowever, the cloud in the form of hosted and managed services has started to meet the processing needs of SIEM solutions, and has helped to democratize access to the high end technology that makes SIEM effective.…
Read MoreWhat do you consider to be the biggest challenges facing cybersecurity today? Some of the challenges are: not enough information security staff. This…
Read MoreWith the realization that code-signing certificate misuse is on the rise…
Read MoreHow do you draw the line between prosecuting a robot that does harm and its creator? Who bears the burden of the…
Read MoreAd fraud is on the rise, and nothing good will come from it.…
Read MoreIt takes a lot more than simply analyzing user activity with rules and statistics…
Read MoreThe word ‘shadow’ seems to take pride of place in this year’s Logicalis annual CIO survey, which asked questions of over 700…
Read MoreThat is when Green had an epiphany, one that amounted to realizing network performance statistics and end user expectations rarely do not go hand in hand.…
Read MoreWhile, “doing it all wrong” may be an exaggeration, no one can deny the fact that breaches are on the rise, and IT security solutions seem to be falling behind the attack curve. Yet, those looking to place blame may need only look in the mirror.…
Read MoreUnder the pressures of transition, SonicWALL hosts a successful partner event that highlights what the future holds for the embattled security vendor.…
Read More