Our entire philosophy revolves around one of the most important assets of any company, DATA. We have chosen the concept CIA (Confidentiality, Integrity and Availability) and built around it a huge portfolio of products and services.

Confidentiality

Your Data is YOUR DATA! We can help you be sure that it stays your data and only the right people have access.

Integrity

Your data evolves, your data grows, keep it intact. For this purpose we can provide you with a great variety of solutions so you can make sure your data is there when you needed and as you needed.

Availability

You may have your data intact and secure, but if you cannot access, it is useless. Ask us about our solutions which can help you, give the right person, the right data at the right time.

Latest News

NetOps Embrace of Automation will lead to need for NetOps Ops

Automation is the future. DevOps has long embraced the

Read More

Building a secure DEVOPS pipeline

Thursday, February 22, 2018 at 17:00 CET | 16:00 GMT |

Read More

The Best Way to Tackle Shadow IT – Secure Apps That Make It Easy to Get Your Work Done

From the latest app on our smartphones to the newest ga

Read More

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

When faced with an either/or situation, people typicall

Read More

Malware Protection 2018 – Public Health Service Prevents, Not Just Detects, Advanced Threats

Malware Protection in 2018 is about prevention not just

Read More

Do 72 Hours Really Matter? Data Breach Notifications in EU GDPR

On January 23, South Dakota’s Senate Judiciary Commit

Read More

Star Wars, Network Security and the Force of SD-WAN

“This is not going to go the way you think.”  —

Read More

Metasploit Wrapup

Wintertime can be a drag. Folks get tired of shoveling

Read More

Is Your Business Continuity Hurting? Put ICE on It

It’s one thing to ensure secure access in the course

Read More

Shaping the Future of Transportation With Secure Clouds

Globalization has transformed the transportation indust

Read More

Our Increasingly Data-Centric World: What to Look Out for in 2018

In 2018, businesses will continue to see demand for mor

Read More

Do I Even Need to Secure the Cloud?

You share responsibility for securing your data in the

Read More

Integrate Your Ticketing System into Database Security to Prevent DBA Privilege Abuse

Many of the recent high-profile data security breaches

Read More

100 days to GDPR – the industry speaks

May 25th 2018 could prove to be a crucial day for many

Read More

Fortify Your Web Application Firewall

Send in Web App Security Reinforcements. Web applicatio

Read More

When do banks need to be ready for PSD2?

Last year was abuzz with discussions and speculations o

Read More

City and County of San Francisco Customer Story

City of San Francisco secures its complex infrastructur

Read More

Scale your Apps and your People (This time for free)

The free, Super-NetOps training program from F5 addres

Read More

2018 WINTER OLYMPICS: CITIUS, ALTIUS, FORTIUS, CYBER ATTACKS?

Only days into the Winter Olympics and reports of cyber

Read More

Tech takes to the ski slopes

Smart technology is more than just an important accesso

Read More

Check Point CloudGuard

Any Cloud, Any App, Unmatched Security   Cloud ado

Read More

OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate

If there’s anything constant in the ever-evolving tec

Read More

Aternity and ServiceNow – Driving up Service Desk Efficiency and Quality

To address the challenges of today’s Service Desk tea

Read More

R7-2017-28: Epson AirPrint XSS (CVE-2018-5550)

The Epson AirPrint web configuration page is vulnerable

Read More

IT Hell: Strategies to Avoid It and Be the Hero

Are you prepared for IT hell? Learn to bulletproof user

Read More

Mobile Android Is an Even Bigger Opportunity for Attackers Than Windows PCs

Mobile Android is now a bigger threat opportunity than

Read More

Four Ways to Measure TCO in a Cloud Environment

IT is a strategic differentiator. Often it is a single

Read More

McAfee Endpoint Security – Why You Don’t Have to Take Our Word for It.

It’s an unfortunate fact that evaluating security ven

Read More

One GRC Manager’s Practical Approach to GDPR Readiness

With about four months to go before the GDPR becomes

Read More

Transformation 2018 – a test of character for the mainframe?

As we welcome a new year, there’s probably one thing

Read More

Linux vs. Windows OS in the Public Cloud – Which Is More Secure for Your Critical Applications?

Enterprises are increasingly migrating mission-critical

Read More

Servitization: Driver #2 to Software Monetization

Today, survival and success for ISVs (independent softw

Read More

Register for a FREE Cloud Threat Assessment Report

Your people access and share data using a myriad of dif

Read More

ReelPhish: A Real-Time Two-Factor Phishing Tool

Social Engineering and Two-Factor Authentication Social

Read More

Pay-As-You-Go Billing in the Google Cloud

With the festive season wrapped up, so too concludes mu

Read More

AMSI BYPASS: PATCHING TECHNIQUE

In this blog post, we introduce a technique that can he

Read More

Citrix: Building the Future to Help Our Customers Deliver Their Future

Recently, some of the brightest and best minds inside C

Read More

Put Your Visibility to the Test

See what risks exist on your network with our 2-week Se

Read More

Check Point Receives NSS Recommended in the Most Advanced Threat Prevention Test

NSS Labs, Inc. released results for the very first Brea

Read More

Diebold Nixdorf, NCR Corp. Send Out Warnings of ATM Jackpotting Attacks to US Banks

ATM manufacturers Diebold Nixdorf and NCR Corp. issued

Read More

When All Else Fails: Root Cause Troubleshooting of Multi-tier Transactions

Transaction trace analysis and prediction Sometimes fin

Read More

February – Test & Take Note

Well, if there’s one good thing to say about February

Read More

Don’t Spectre-late: Our Spectre and Meltdown Scorecard

Early January 2018 was unlike any other – I’m not r

Read More

VERMIN: Quasar RAT and Custom Malware Used In Ukraine

Palo Alto Networks Unit 42 has discovered a new malware

Read More

Do You Want to Consolidate Your 3D Apps in the Data Center?

At Cisco Live Europe, we held a session about 3D graph

Read More

Build a secure and scalable BYOD program

Increase productivity by enabling your employees to wor

Read More

McAfee Endpoint Security Earns Top Product Award

The AV-TEST Institute, a leading international and inde

Read More

2017 OWASP Top 10: The Good, the Bad and the Ugly

Since its founding in 2001, the Open Web Application Se

Read More

Enhanced Security with Automated Traffic Visibility for Micro-Segmented Security Groups

Software-defined data centers (SDDCs) and decomposing a

Read More

Digitalization: Driver #1 to Software Monetization

There is much confusion around the difference between d

Read More

Managing Workforce Cyber Risk in a Global Landscape, by Hogan Lovells

To effectively identify, prevent and mitigate the effec

Read More

Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign

FireEye researchers recently observed threat actors lev

Read More

Risk vs. Reality: Don’t Solve The Wrong Problem

IT leadership and security folk alike struggle with acc

Read More

Malware, Mistakes and Meaningful Measures to Protect Critical Infrastructure

Security and industry experts have long advocated for t

Read More

What’s New with Citrix Workspace in January 2018

Welcome to our first monthly “What’s New in Citrix

Read More

Cisco and IBM: Partnering for Better Security

Considering the spate of cyber threats faced by custome

Read More

How to protect your CXOs from cybersecurity missteps

EXECUTIVE SUMMARY: Executives at the c-level are often

Read More

How to Choose a SD-WAN + Integrated Visibility Solution

SD-WAN + integrated visibility could be your fast lane

Read More

Incorporating Automated Actions Into Your Vulnerability Management Process

In today’s security climate, we all want to know that

Read More

Increase User Productivity Today with Secure Access

User productivity: every business wants it, but not eve

Read More

Ransomware Protection Done Right!

FIND OUT WHAT NETWORK ADMINS NEED TO KNOW TO IMPROVE PE

Read More

Designing the Next Generation Data Center

Next generation data centers allow your IT staff to do

Read More

Twitter Accounts of US Media Under Attack by Large Campaign

A previously reported campaign purportedly carried ou

Read More

Improve the ROI of Your Database Protection Investment

When an organization considers switching a mission-crit

Read More

Gigamon Helps Secure Military Networks in Remote Hot Spots

The daily commute for most involves a simple car or pub

Read More

Digitalization, Servitization, Consumerization: The Keys to Software Monetization

One of the major drivers in our connected landscape is

Read More

Forcepoint Updates on Spectre and Meltdown

The year 2018 has gotten off to a tough start with the

Read More

Five Practical Ways for Executives to Manage Cyber Threats

According to the World Economic Forum, cyber security

Read More

State of Application Delivery 2018: Digital Transformation Changes Everything

Digital transformation (DX) is a slippery term to defin

Read More

Building a Secure DevOps Pipeline

A PwC Cybersecurity and Privacy white paper Businesses

Read More

Combating Cloud Sprawl: Why it’s Now a Critical Need for Today’s Enterprise

Not long ago, cloud was seen as a fad—something for s

Read More

Cisco Email Security Named Market Leader

The analysts have spoken. After examining the Secure Em

Read More

Join the Success with Check Point

Tuesday, January 30, 2018: 9:00 AM PT | 12:00 PM ET Clo

Read More

SAMSAM Ransomware Hits US Hospital, Management Pays $55K Ransom

Hancock Health, a regional hospital in Indiana, paid a

Read More

Riverbed SD-WAN and Zscaler Cloud Security

Accelerate your digital transformation by streamlining

Read More

Taking a Message-Based Approach to Logging

When you think about it, a log entry is really nothing

Read More

Running End-of-Life SA, IC, or MAG Appliances? Here is What You Should Know

Appliances have natural life spans. And if your SA, I

Read More

AutoFocus 2.0.3 Release Documentation is Now Live!

Release Highlights This release of AutoFocus introduces

Read More

Unleash the Power of Your Hybrid Cloud

Discover how you can transform your data into a strateg

Read More

2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

For the 11th year in a row, Gartner has named McAfee as

Read More

Cloud Migration: Technical and Business Considerations SHARE

If you’re like many businesses, you’re moving appli

Read More

Micro Focus tackles compliance requirements across GDPR, MiFID II and more with Digital Safe 10

Latest cloud archiving solution advances information ri

Read More

Why We Need to Think Differently about IoT Security

Breach fatigue is a real issue today. As individual con

Read More

Five predictions for the IoT in 2018

2017 was another big year for the IoT. Consumers contin

Read More

Security in the Golden Age of Cybercrime

REPORT An Exploration of Network Security in the Federa

Read More

Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign

FireEye researchers recently observed threat actors lev

Read More

Starting Your Journey as a ‘ChatBot’ Developer

In no more than two years, ChatBots have raised from a

Read More

SD-WAN: The Backbone of Hybrid Cloud for the Enterpris

Software-Defined WAN (SD-WAN) is, quite simply, the bac

Read More

15 Cyber Security Stats At-A-Glance

15 CYBER SECURITY STATS AT-A-GLANCE January 16, 2018 |

Read More

How to Choose a Security Orchestration and Automation Platform

In the market for a security orchestration and automati

Read More

Endpoint Security, powered by XGen™

Maximum protection Endpoint Security, powered by XGen&#

Read More

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

In the past, cyber-criminals have targeted businesses,

Read More

It’s Official: Skyhigh Joins McAfee, the Device-to-Cloud Cybersecurity Company

I’m pleased to announce McAfee has completed our acq

Read More

Our Analysis of 1,019 Phishing Kits

In recent years phishing activity has grown rapidly, wi

Read More

Optimize Your Data Investments by Easily Tiering to Object Storage Today

In a perfect world, if you were building your storage i

Read More

2017 Black Hat Europe NOC: Tales of Coverage and Compromise

Overview of the Black Hat NOC In the beginning of Decem

Read More

Gartner: 2017 Magic Quadrant for Software Test Automation

The Gartner Magic Quadrant for Software Test Automation

Read More

Network Virtualization: What Is It and How to Optimize It?

As on-premises environments become more expensive and c

Read More

DMARC Email Authentication: What Federal Agencies Need to Know

Domain-based Message Authentication, Reporting and Conf

Read More

FireEye Announces Acquisition of X15 Software

X15 Software’s Next Generation Big Data Platform To A

Read More

Cisco Umbrella

Cisco Umbrella is a cloud security platform that provid

Read More

How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?

Multi-cloud is the standard approach for cloud adopting

Read More

The Power and Potential of Robotic Process Automation. And the Security Risks.

The Power and Potential of Robotic Process Automation.

Read More

The Art of Scaling Containers: Retries

Scaling containers is more than just slapping a proxy i

Read More

How The Spectre/Meltdown Vulnerabilities Work

The Spectre and Meltdown vulnerabilities recently disco

Read More

Networking Superpowers for the Cloud Ninja

Thursday, January 25 2018, 11am PT | 2pm ET Amazon Web

Read More

Patch Tuesday – January 2018

The first Microsoft patches of 2018 came early, with ne

Read More

Ransomware: Unlocking the Lucrative Criminal Business Model

Ransomware, specifically cryptographic ransomware, has

Read More

Cloud Migration Fundamentals

The advantages offered by a cloud-based environment mak

Read More

Changing Role of the CISO

With the growth of digital world, we have seen growth i

Read More

Got a New Mobile Device? Here are Five Ways to Protect It.

The chances are good that you or someone in your family

Read More

Data Management Automation for CI/CD with NetApp and Apprenda

Apprenda is a popular container management platform al

Read More

Adopting Automation: Don’t Sacrifice Strategy for Speed

Like multi-cloud, automation can be (and should be) str

Read More

FireEye Endpoint Security Agent is Compatible with the Meltdown Windows Security Update

On Jan. 3, 2018, researchers released details of a vuln

Read More

The Buzz Around Securing Commercial Drones is Getting Louder

Drones have been quietly building their capabilities ov

Read More

This Year’s Big Cyber Target Could Be the Factory Floor

We’ve all witnessed the steady stream of high-profile

Read More

2017’s Notable Vulnerabilities and Exploits

A hacker or cybercriminal’s toolbox would not be comp

Read More

Enterprise Networking – Trends for 2018

2017 has been a year of incredible progress and change

Read More

Top 5 Cloud Security Tips (How to Protect Your Data in the Cloud)

Securing the Cloud carries a totally new and unique set

Read More

Predictions for 2018–The Network as the Keystone

It seems like the pace at which technology of all types

Read More

SentinelOne is Compatible with “MELTDOWN” and “SPECTRE” Fixes

SentinelOne products are compatible with Microsoft’s

Read More

Meltdown and Spectre: What you need to know (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)

After waking up from a long winter’s nap, you may hav

Read More

Welcoming Secure Access into the New Year

Before we say good bye to 2017, enterprise security l

Read More

Gartner Market Guide: Elevate defenses with endpoint detection and response solutions

Endpoint defenses are evolving to keep pace with and ge

Read More

You Put Your Data Where? Protecting Your Data in the Hybrid Cloud.

You put your data where? Protecting your data in the hy

Read More

How the Next-Generation Security Platform Contributes to GDPR Compliance

The General Data Protection Regulation is the European

Read More

3 Ways Biometric Technology Will Change the Face of Financial Services

As 2018 gets under way, we may look back on it as a mil

Read More

Gigamon and Plixer – Extending Visibility into the Public Cloud with NetFlow and IPFIX

With the increasing awareness of security vulnerabiliti

Read More

2017 Forrester Wave™: DDoS Mitigation Solutions

Guess who is top ranked in current offering and strateg

Read More

Operation Dragonfly Analysis Suggests Links to Earlier Attacks

On September 6, Symantec published details of the Drago

Read More

Critical Capabilities for Enterprise Data Loss Prevention 2017

Forcepoint Received Highest Product Score For Regulator

Read More

3 Steps & 5 Minutes Can Stop a Top Security Risk in Your Organisation

The fact that human error is the biggest security risk

Read More

What Lies Ahead? Cyber-Security Predictions for 2018

Arnold H. Glasow famously quipped that “the trouble w

Read More

Cryptojacking: Hijacking your computer resources

Your internet connection is slower than usual, your PC

Read More

The Magic Behind Rapid7 Managed Application Security Services

When I was younger, one of my favorite gifts was a magi

Read More

Flex your Superpowers, SD-WAN for the Cloud Era

Why SD-WAN? Traditional Wide Area Networks (WANs) rely

Read More

Security Predictions for 2018 Paradigm Shifts

Skills and resources — these are the two elements tha

Read More

10 Good Reasons to Choose NetApp for Machine Learning

Artificial intelligence (AI) can help your team get gre

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader!

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

Secure Access in the Virtual Landscape

Whether supporting “workstyle innovation” initiativ

Read More

Don’t Settle for “GOOD ENOUGH” Mobility

Modern enterprises are rapidly shifting core business p

Read More

Generating Compliance History Reports

When you’re managing a large environment with thousan

Read More

DevOps in the Cloud: How Data Masking Helps Speed Development, Securely

Many articles have discussed the benefits of DevOps in

Read More

Gigamon Introduces the First Scalable SSL Decryption Solution for 100Gb Networks

Reduces Costs and Time-to-Threat Detection via Architec

Read More

The Future of COBOL applications

Digital is driving faster change across every aspect of

Read More

Preventing Attacks Launched Deep Within the Network

Attacks that exploit Kerberos, a Windows authentication

Read More

Security Rule Zero: A Warning about X-Forwarded-For

Proxies operate on the premise that they exist to forwa

Read More

Security Predictions 2018

Cyber crime is a business that threat actors take very

Read More

Forcepoint GDPR Resource Pack

The Forcepoint GDPR Resource Pack will help your organi

Read More

Cities Exposed in Shodan

Western European, UK, French, German, and US cities exp

Read More

Forrester’s 2018 Cyber Security Threat Predictions

Bigger Cyber Threats and Higher Risk Webinar: Thursday,

Read More

You already own the most powerful security tool. Are you really using it? Really?

See and stop threats using your existing network. If yo

Read More

Unify endpoint management under a single console

Is your endpoint management strategy ready for the digi

Read More

Palo Alto Networks Unit 42 Vulnerability Research November 2017 Disclosures – Adobe

As part of Unit 42’s ongoing threat research, we can

Read More

The Right IoT Mindset for 2018 and Beyond

Just when companies thought they’ve successfully tran

Read More

Gartner 2017 Magic Quadrant for Security Information and Event Management (SIEM)

Gartner evaluated Rapid7’s integrated detection and

Read More

Three Insights from AWS re:Invent 2017 on Enterprise Cloud Journeys

Last week some Riverbed colleagues and I attended the 2

Read More

Building an Economic Moat: Strategy Nerd Stuff for Service Providers

The investment firm Morningstar coined the term “econ

Read More

Q3 2017 Global DDoS Threat Landscape Report

Today we are releasing our latest Global DDoS Threat La

Read More

GDPR as a Business Enabler – Fact or Fiction?

The new General Data Protection Regulation (GDPR) will

Read More

MobileIron Cloud November 2017

We are excited to announce that the latest release of M

Read More

3 lessons to learn from Blade Runner 2049

Last month, a very long wait came to an end for Blade R

Read More

Top Network Security Products Revealed in Latest Tests

Tuesday, December 5th, 2017 at 3:30 PM EST (20:30:00 UT

Read More

Now That’s Cryptographic Computing Power

It was recently discovered that more than one business

Read More

Forecast Calling for Cloud? Learn the Steps to Blue Skies

When discussing cloud with customers, some of the most

Read More

Protecting Cross-Border Data Transfers For GDPR

Corporate legal counsels, technology providers, IT prof

Read More

How to prepare your company for the new European Union privacy laws

The European Union is replacing the patchwork of indivi

Read More

The Underground Uber Networks Driven by Russian Hackers

Uber’s ride-sharing service has given birth to some o

Read More

Trend Micro Enhances Cloud Security Through Integration with AWS Security Services

Trend Micro Incorporated, a global leader in cybersecur

Read More

What’s the Rx for DX?

Thursday, December 7th, 2017 | 11:00am PT | 2:00pm ET R

Read More

Uber Takes Cloud Security For A Ride

Cloud security has had a rough ride of it recently, and

Read More

How to avoid cybercrime while shopping—and what Cisco is doing to help

Cybersecurity should be top of mind when shopping onlin

Read More

InsightAppSec Feature Highlights: On-Premise Engines, JIRA Integration, and More

Powerful Yet Simple DAST Scanning Gets Even Better Insi

Read More

Same Security, Less Complexity

It can be tempting to “see no evil, hear no evil, spe

Read More

MobileIron Creates New Internet of Things Division

MobileIron, the security backbone for the digital enter

Read More

Blending the Power of ONTAP Cloud on AWS with VMware Cloud on AWS

You may wonder what NetApp is up to with our latest eff

Read More

McAfee and Amazon Web Services: A Secure Relationship

As enterprises continue their journey to the cloud, man

Read More

Massive E-mail Campaign Spreads Scarab Ransomware

In a similar fashion to the Jaff ransomware, Forcepoin

Read More

What will smartphones look like in 2025?

According to Mashable, the biggest tech story in 2016 w

Read More

Continuous Delivery for All: Automation for greenfield AND heritage applications

• Agile and DevOps – what are Agile and DevOps and

Read More

Build-Your-Own Data Masking. Yes or No?

A lot of organizations are taking great strides to prot

Read More

Phishing: The Secret of Its Success and What You Can Do To Stop It

Introduction Phishing has proved so successful that it

Read More

Technology Innovation in 2018: From AI, VR and IoT to robotics

The rapid pace of innovation in today’s tech world ma

Read More

Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps

In this blog post, we introduce a new attack vector dis

Read More

FireEye Autumn Demo Series

Innovative FireEye technologies continue to set the sta

Read More

Excellence in Omnichannel Customer Experience: A Retail Success Story

Is it just me? Or did the holiday shopping period start

Read More

The Week in Security Week

Welcome to our weekly roundup, where we share what you

Read More

The Danger Behind Santa’s Beard

Santa’s beard is usually white, the colour of purity

Read More

Security, Off the Beaten Path

Cisco Umbrella and AMP for Endpoints extend protection

Read More

Takeaways from 2017 SANS State of Application Security Survey

The training and research organization SANS recently re

Read More

How to Deliver Always-On Applications for the Always-On Business

Never before has the choice of business application imp

Read More

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated Threat Response and Relevance to IT and OT Au

Read More

Is Your Infrastructure Integrated Into Your Software Delivery Processes?

Any company, including NetApp, in the business of deliv

Read More

Continuous Delivery for All: Automation for greenfield AND heritage applications

Thu, Dec 7, 2017 6:00 AM – 7:00 AM EST Agenda •

Read More

Sith Spam Bots Take a Page from a Star Wars Novel(s)

Online excitement is at an all-time high, as the Decemb

Read More

New Android Malware Found in 144 GooglePlay Apps

McAfee’s Mobile Research team has found a new Android

Read More

What’s New with MobileIron EMM: Top Highlights of Core 9.6

We are excited to bring you another new release of Mob

Read More

2018 Security Predictions

New security challenges in 2018 Hackers are already sch

Read More

Protecting Critical Infrastructure Is … Well … Critical

In our day-to-day lives, we rely on a well-running infr

Read More

Tomorrow’s Endpoint Protection Platforms

Why common endpoint security can’t beat modern threat

Read More

CyberArk Unveils V10 – Simplicity, Automation, Risk Reduction

The iPhone is not the only v10 to be released this year

Read More

Presenting security and risk to board members

Your board’s time—and attention—is limited. B

Read More

Digital Vikings and the Internet of Ransomed Things

The saying “Prediction is very difficult, especially

Read More

Expanding the Cisco Security Technology Ecosystem

Today we are delighted to announce that the Cisco Secu

Read More

How Companies do Digital Experience Measurement

Every IT leader would agree that delivering an excellen

Read More

Coupon fraud could be costing your business millions

Customers are always looking for good deals with their

Read More

Never Home Alone

Securing IoT devices from your home to everywhere DOWNL

Read More

Testing Developer Security with Metasploit Pro Task Chains

In this modern age, technology continues to make inroad

Read More

Are You Ready to Fast Track Your Transformation to a Data Thriver?

Over the next three years, digital transformation (DX)

Read More

Pulse Secure Recognized as Ingram Micro Emerging Vendor of the Year

Pulse Secure is proud to announce it has received the

Read More

Why is Ransomware Still a Huge Problem for Organizations?

Ransomware has been around for nearly 30 years but it r

Read More

Secure Mobile Content Management (MCM) Keeps Data Safe and Business Moving

Employees stay productive wherever they work with secur

Read More

The Good Fortune of Number Fourteen

IBM’s recent Q3 results gave shareholders a welcome b

Read More

Can a License Solve Your Cloud Migration Problem?

No, but it can certainly reduce friction. Cloud adoptio

Read More

Self-Signed Certificates Can Be Secure, So Why Ban Them?

In many organizations the use of self-signed certificat

Read More

The Devious Netflix Phish That Just Won’t Die

THE EMAIL HITS  your inbox with an urgent warning: Yo

Read More

2017 NSS Labs Next Generation Intrusion Prevention System Report

Once again, Forcepoint NGFW is shown to be a highly-ef

Read More

Double Down On Security

People around the world are increasingly conducting the

Read More

What Is Network Visibility?

At a time when network security and monitoring is of vi

Read More

Using AI for early skin cancer detection

The skin we’re in is the only skin we’ve go

Read More

3 Challenges for delivering applications in the hybrid cloud

Hybrid cloud is increasingly becoming a new reality for

Read More

“Alarming” lack of privileged account security awareness in DevOps

DevOps environments are facing an ‘alarming’ lack o

Read More

Cloud First also means Security First—here are steps for getting there

Cloud security is ever-increasingly becoming an inescap

Read More

Riverbed and Zscaler Power the Transformed Enterprise

Legacy security and networking approaches have no place

Read More

Hack a Mac: It’s Not Impossible

It’s a commonly held belief that if you want to avoid

Read More

Data Center Attack: The Game

Game Overview In Data Center Attack: The Game, put you

Read More

How Hackers Could Have Taken Control of LG’s IoT Home Appliances

The second season of award-winning TV thriller Mr. Rob

Read More

ONTAP Select Is Now on the IBM Cloud Marketplace

ONTAP Select is now live on the IBM Cloud Marketplace!

Read More

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Nigerian Threat Actors have long been considered a nuis

Read More

When It Comes to Access, Security, and Visibility, Is Your Head in the Clouds?

Today’s massive migration to the cloud is no surprise

Read More

IoT Mobile Application Credential Encryption

As the IoT Research Lead at Rapid7, I have looked at

Read More

Speed up and optimize software delivery through DevOps

Download this Forrester Report—The Need for Speed: Dr

Read More

Cloud WAF Versus On-Premises WAF

“The Times They Are a Changin’”, Bob Dylan knew i

Read More

Expiro Malware Is Back and Even Harder to Remove

File infector malware adds malicious code to current fi

Read More

Why we’re excited about Google Zero Touch provisioning

Recently Google announced support for Zero Touch Provis

Read More

Reaper: The Professional Bot Herder’s Thingbot

This isn’t your mama’s botnet. This is a proper bot

Read More

2017 – An active year for APT groups

From cyber criminals who seek personal financial inform

Read More

Mission-Critical Network Security, Evolved

Realize the synergetic potential of integrating traditi

Read More

Account Hijacks Affect Everybody, Even ‘Top Dogs’

Being “cool and smart” was the name of the game whe

Read More

Telemedicine startup wants to make it easier to see your doctor

With advances in technology, it’s easier than eve

Read More

Cloud Workspace Services, Adoption Made Simple

The adoption of cloud services poses dilemmas for compa

Read More

7 Types of Privileged Accounts You Should Know

Privileged accounts exist in many forms across an enter

Read More

Spooky Cyber Security Stories

With Halloween just around the corner, there are lots o

Read More

NCSAM Security Crash Diet, Week 3: Privacy and Backups

Hey, I didn’t see you there (had my cameras and micro

Read More

Coin Miner Mobile Malware Returns, Hits Google Play

The efficacy of mobile devices to actually produce cryp

Read More

Code Execution Technique Takes Advantage of Dynamic Data Exchange

Email phishing campaigns are a popular social engineeri

Read More

MobileIron Bridge

Modern desktop security and management with the granula

Read More

NetApp HCI Officially Arrives

Today we are excited to announce that NetApp HCI is f

Read More

Automatic Static Detection of Malicious JavaScript

JavaScript, alongside HTML and CSS, is considered a cor

Read More

5 ways NFC technology is improving the sports world

When you mention ‘NFC’ to the average American spor

Read More

No More Network Blind Spots, See Um, Secure Um

East Coast summer nights of my childhood were thick wit

Read More

What to Look for in a Credible Unified Endpoint Management (UEM) Solution

Invest in a Unified Endpoint Management (UEM) solution

Read More

Detecting Data Breaches, Why Understanding Database Types Matters

Different data characteristics and access patterns foun

Read More

Internet Outages, Botnets… Just Another Day at the Office

2017 seems to have been a breakout year for cyber risk,

Read More

A Matrix Approach for Account Ranking and Prioritization

Throughout the course of my six years in helping KPMG

Read More

BACKSWING – Pulling a BADRABBIT Out of a Hat

Executive Summary On Oct. 24, 2017, coordinated strateg

Read More

The Future OF IoT Security Through the Eyes of F5 Threat Researches

I recently had the opportunity to sit down with two of

Read More

Bad Rabbit Ransomware Attack Blocked by Check Point SandBlast Anti-Ransomware

A new ransomware attack called Bad Rabbit has struck or

Read More

Bad Rabbit Ransomware Spreads via Network, Hits Ukraine and Russia

An ongoing ransomware campaign is hitting Eastern Europ

Read More

What are Cisco and Google Cloud Working On…Together?

During my early years in software development at Bell L

Read More

Driving Digital Transformation with a Secure Digital Workspace

As state and local government organizations consider ho

Read More

NCSAM, A Personal Security Crash Diet

Hey everyone! It’s October, and that means it’s tim

Read More

KRACK & WPA Vulnerability, 3 Ways to Enhance Wi-fi Security

Security researchers recently announced vulnerabiliti

Read More

Riverbed SD-WAN is Simple

Keep your SD-WAN simple. Enjoy SD-WAN capabilities in t

Read More

A macOS Perspective from SentinelOne: Remote Desktop and PuPs

WHAT ARE PUPS? A PUP is a Potentially Unwanted Program.

Read More

Ransomware Decryption Framework – Now Available

How do I get my files back?  This is probably the firs

Read More

MobileIron and Zimperium to Deliver First Real-Time Detection and Remediation for Mobile Threats

MobileIron, the security backbone for the multi-cloud e

Read More

One-Click SAP System Migration to the Cloud

Have you ever dreamed of quickly moving your dev/test S

Read More

Only YOU Can Secure Your Data in the Public Cloud (In My Best Smokey the Bear Voice)

Public cloud security is a shared responsibility but ex

Read More

Three Key Actions From Cyber Security Awareness Month You Can Take

In a world where the Internet has become significant pa

Read More

If Money Can’t Buy Happiness, Can It Buy Security?

Gigamon has just published the results of a recent Van

Read More

Getting Cloud Migration Right–Moving to AWS

Fri, Nov 3, 2017 11:00 AM – 12:00 PM EDT Hybrid I

Read More

Tuning Capacity Tips for SecureSphere Database Activity Monitoring

You have Imperva SecureSphere Database Activity Monito

Read More

Boundhook, Exception Based Kernel-Controlled Usermode Hooking

BOUNDHOOK: EXCEPTION BASED, KERNEL-CONTROLLED USERMODE

Read More

Where does a WAF fit in the data path?

Web application firewalls (WAFs) are an integral compon

Read More

Breach Resilience

Join Jeff Berg, Sr. Manager of Cyber Threat Intelligenc

Read More

A Predictive “PreCrime” Approach Requires a Human Focus

In Philip K. Dick’s 1956 “The Minority Repo

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his

Read More

KRACK Attack, How Secure is Your Wi-fi Connection?

A cybersecurity researcher of KU Leuven in Belgium, Mat

Read More

Joining Forces for Cybersecurity Openness – Cisco pxGrid and McAfee OpenDXL

Interoperation of two leading security integration fram

Read More

Download the Citrix Ransomware kit

Are you reducing your attack surface so ransomware atta

Read More

MobileIron adds Apple macOS features to its enterprise mobility management tools

The Apple Release from MobileIron gives a nod to enterp

Read More

Introducing Elio

Meet Elio, NetApp’s new virtual support assistant wit

Read More

8 Months to Go – Are You Getting the Most Out of What You Already Own?

As we move closer to the May 2018 deadline for GDPR, mo

Read More

InsightOps – 2 minute overview

A two-minute overview of Rapid7 InsightOps—your moder

Read More

5 Keys to Quick and Effective Identity Verification Service Deployment

ID fraud is a critical issue for MNOs (Mobile Network O

Read More

Why We Need to Think Differently about IoT Security

Breach fatigue is a real issue today. As individual con

Read More

COBOL to the core

A COBOL Context Micro Focus has evolved to become a muc

Read More

Ransomware Attacks on MySQL and MongoDB

Ransomware is arguably one of the most vicious types o

Read More

Privileged Task Automation and Management With CyberArk

CyberArk’s Product Marketing Manager Corey O’Connor

Read More

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-i

Read More

Devising a Suitable End State of Your CTI Program

The shift to an intelligence-led security program can s

Read More

Forcepoint GDPR Product Mapping Webcast Series

In this three-part series of short, live webcasts, Forc

Read More

Simplifying Security Through Integration

(Live Webinar October 13, 2017 at 1:00pm Eastern Tim

Read More

No More Limits

Watch Josh Atwell, Developer Advocate at NetApp, explai

Read More

September’s Most Wanted Malware, Locky Shoots Back Up Global Rankings

Check Point’s latest Global Threat Index has revealed

Read More

Winning the Business Relay Race with ShareFile Secure Document Workflows

As I mentioned in my last few blog posts (links below),

Read More

Palo Alto Networks Unit 42 Vulnerability Research September and October 2017 Disclosures

As part of Unit 42’s ongoing threat research, we can

Read More

Buy one appliance and get the second one free

Modernize your enterprise VPN with the latest Pulse Sec

Read More

NCSAM, A Personal Security Crash Diet

t’s October, and that means it’s time to kick off t

Read More

SD-WAN. Oversimplified.

Technology can be extremely complex. And while software

Read More

How to Protect AWS ECS with SecureSphere WAF

Adoption of container technology is growing widely. Mor

Read More

Go with the flow! Automating and streamlining workflows with OpenDXL

Date: Wednesday, October 11, 2017 Time: 3:00PM BST |

Read More

Software Defined Storage: The Future of Storage Coming into Focus

As data becomes more diverse, more distributed, and mor

Read More

Best Practices in Release and Deployment Management

Automation is the quickest route to high performance, b

Read More

Partnering With Startups – The Road to Innovation

Until recently, established enterprises and startups ad

Read More

Rethinking Your Cybersecurity Approach, Thoughts From A CIO

October is National Cybersecurity Awareness Month, and

Read More

Breach Resilience Technology. Intelligence. Expertise

We understand the challenges and complexities that you

Read More

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-i

Read More

The Unique Challenges of Protecting Cloud Workloads

Addressing Cloud Vulnerabilities The cloud offers organ

Read More

Moving to the Cloud? Rethink your Security Efficacy

How do you protect your hybrid cloud deployments agains

Read More

Riverbed Future of Networking Global Survey 2017

Riverbed Global Survey Reveals Insights from 1,000 Busi

Read More

Maximize VMware on AWS

It’s been this binary choice for customers for far to

Read More

First, Do No Harm. Securing Healthcare IoT Devices

“When a hacker takes control of all networked medical

Read More

Ask the IoT Whiz, Defending Your Operations in the Era of IoT

This Cybersecurity Month, I’m pleased to present you

Read More

6 Dangerous Misconceptions about Network Security

When assessing or implementing network security, miscon

Read More

The Universal Translator in InsightAppSec and AppSpider

Providing better support for scanning modern web applic

Read More

Practical Tips for Personal Online Security

As a cybersecurity professional I write about enterpris

Read More

The Hack Back, A Double-Edged Sword

Global cyberattacks like Mirai, WannaCry and Petya have

Read More

NetApp AutoSupport is Evolving

Those eagle-eyed NetApp users among you may have notice

Read More

FireEye Endpoint Security (HX) 4.0 – Bringing Advanced Protection to Endpoint

A constant concern about Endpoint Protection Platforms

Read More

Building a Case for Legislating IoT Security

Earlier this summer, US lawmakers proposed a new legis

Read More

7 Cybersecurity Tactics to Watch in Government

Are you up to speed on the latest government cyber deve

Read More

Overcoming Cloud Security Challenges

Does your cloud expose you to data breaches? Protecting

Read More

Cisco Stealthwatch Cloud Free Trial

Secure your public cloud, private network, or hybrid en

Read More

Get Your Enterprise Ready for General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is said

Read More

Bots are the Bane of Turing Security Test

Bots are cool. Bots are scary. Bots are the future. Bot

Read More

Threat Actors Target Government of Belarus Using CMSTAR Trojan

Palo Alto Networks Unit 42 has identified a series of p

Read More

macOS Keychain Security, What You Need To Know

If you follow the infosec twitterverse or have been kee

Read More

Extend Cloud Resources to the Azure-Ready Edge

Riverbed has long been optimizing application delivery

Read More

Machine Learning for Threat Detection, Hype vs. Reality

Thursday, October 5, 2017,  1:00 p.m. EDT Machine lear

Read More

The Attack on Enterprises for PII and The Need for User Behavior Analytics (UBA)

Information is the key. Information is what executives,

Read More

Building a Security Risk Management Program

The frequency of data breaches today highlights the nee

Read More

The new McAfee Is Extending Our Stride

With McAfee’s spin-off from Intel completed, our focu

Read More

How to Uncover New Savings with Infrastructure Analytics

Business-level metadata is absolutely critical for cont

Read More

Six Steps to Finding Honey in the OWASP

According to Verizon’s 2014 Data Breach Investigation

Read More

The CyberAvengers Playbook

The Non-Technical, No Nonsense Guide For Directors, Off

Read More

ForcePoint Viewpoint on Recent Data Hacks and Breaches

Updated Ed. Note: We continue to see a rash of data bre

Read More

DDL Pilot Goes Live in Maryland and Washington DC

Gemalto’s live pilot for digital driver’s licenses

Read More

The Unified Endpoint Gold Standard, Citrix Receiver, XenApp and XenDesktop

With all the buzz about unified endpoints, you can be f

Read More

Discover the Top 3 Reasons to Upgrade to a Cisco NGFW

As a Cisco customer, you expect the best in defending a

Read More

BlueBorne, A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device

The IoT cybersecurity firm, Armis, has revealed eight

Read More

Introducing CYBERARK Conjur Open Source Secrets Management Solution

“Don’t underestimate the power of your vision to ch

Read More

Multiple vulnerabilities in Wink and Insteon smart home systems

Today we are announcing four issues affecting two popul

Read More

Is APM the Missing Link in YOUR DevOps Tool Chain?

Tuesday, October 3rd, 2017 | 10:00am PT | 1:00pm ET Del

Read More

Hybrid Cloud Security, powered by XGen™

Optimized for leading environments Hybrid Cloud Securit

Read More

Consistency is Key for IoT Security

A version of the below excerpted article originally app

Read More

MobileIron Bridge, Consistent security and efficient management across all devices

Closing the EMM gap MobileIron Bridge is the first solu

Read More

McAfee Demos Ease of Exploiting Recent Apache Struts Vulnerability

A series of exploitable conditions have been uncovere

Read More

How to Deploy SecureSphere WAF on Azure

If you host apps in the cloud, then you need security i

Read More

Be Data Ready with NetApp and SAP to maximize your opportunities today – and tomorrow

Fill out the form and we’ll send you “NetApp for SA

Read More

ACI Worldwide Success Story

“The Silk tools are now instrumental to our software

Read More

Evader by Forcepoint

What is Evader? The 2017 NSS Labs NGFW Test reveals m

Read More

The Blockchain Bubble, Identifying viable opportunities for blockchain

Blockchain technology is popping up everywhere from the

Read More

The Case for Network Visibility

As a security professional and a consumer, my ears perk

Read More

Three Things about Networks That Every CIO Should Have on their Agenda

We are headed for a future in which everything will be

Read More

The Whys and Wherefores of Automating Privileged Tasks

A task can be defined as: noun 1.  A piece of work

Read More

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

It has been said – and not just by me – that encryp

Read More

FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye recently detected a malicious Microsoft Office

Read More

Optus Fusion SD-WAN – the Future of your Network, Today

I’ve worked in the industry for over 25 years, with r

Read More

PCI DSS 3.1 Compliance in the Modern Data Center & Cloud Lessons & Advice from Expert QSA Coalfire

Join Forrest McMahon from Qualified Security Assessor (

Read More

ExpensiveWall, A dangerous ‘packed’ malware on Google Play that will hit your wallet

Check Point’s mobile threat research team identified

Read More

When Walls Come Down

When you begin remodeling an older home you realize tha

Read More

Tiered Storage, How to Calculate Your Potential Margins

For cloud or managed hosting providers, storage is obvi

Read More

Protect Yourself From Antivirus

Prevent Security Breaches. Protect Your Users. Secure Y

Read More

Pulse Secure Access Solution Presented by Drawing a Whiteboard Diagram

Play Sep 12 2017 | 60 mins Graham Duthie In this webi

Read More

Rapid7 CEO, Rethink IT and Security Organizational Structures

Companies are under constant pressure to innovate in to

Read More

One year later, McAfee ESM

We have two SIEMs in the Labs and we use them slightly

Read More

Micro Focus Accelerates Deployment of Hybrid Cloud Workloads with Sensitive Data

Voltage SecureData Cloud for AWS enables consistent dat

Read More

Gartner Again Named Us a Leader in WAF

We added flexible pricing. You get the easy decision. G

Read More

Go Beyond the Limits of Airwatch

Today, many organizations still rely on a variety of to

Read More

The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products

Antivirus (AV) protection has been the foundation for e

Read More

GDPR, Why US-based Organizations Must Pay Attention, Now!

Date: Thursday, September 14, 2017 Time: 11:00 AM 

Read More

Five IoT gadgets to take on your next holiday

It’s the beginning of September, and even though you

Read More

Visibility is Essential

Vanson Bourne Report: Lack of Visibility is a Leading O

Read More

Active Threat Analytics

You’ve implemented security technology to block the m

Read More

The Usual Suspects – The Security Pitfalls of Data At Large

Data is the crown jewel of an organization – its high

Read More

Securing Your Cloud Environment, Six Critical Use Cases to Consider

Migration to the cloud continues to accelerate as organ

Read More

Maslow’s Hierarchy of Automation Needs

If there’s anything hotter than containers right now,

Read More

Apache Struts S2-052 (CVE-2017-9805). What You Need To Know

Apache Struts, Again? What’s Going On? Yesterday’s

Read More

SD-WAN. Oversimplified.

Technology can be extremely complex. And while software

Read More

Edith Wharton, Identity Theft, and the GDPR

During one of my talks for Gartner, I asked the audienc

Read More

Layered Protection Is a Must. Here’s Why.

Cyber attacks are advancing in their sophistication. Ta

Read More

Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code

Many attacks on mobile devices use social engineering t

Read More

What Do Best-of-Breed Security Products and Top NFL Draft Picks Have in Common?

Analyzed individually, they can’t predict success.

Read More

The Wait Is Over – SnapCenter 3.0 Is Here

How can you jumpstart protecting your SAP HANA database

Read More

Lives Are on the Line with IoMT in Healthcare

A patient lies on his bed. A furrow of concern crosses

Read More

All Killer, No Filler, How Metadata Became a Security Superpower at Gigamon

Gigamon on Gigamon: Learn how we leverage the power of

Read More

Identity Fraud Is Everywhere, Here’s How to Improve Market Fraud Scoring Systems

A particular type of fraud has emerged in various count

Read More

Blockchain Versus the GDPR

The EU’s General Data Protection Regulation (GDPR)

Read More

Discovering a Session Hijacking Vulnerability in GitLab

GitLab is a widely used SaaS provider that focuses on d

Read More

Retail Network Security Trends and Threats Report

In this webcast Michael Osterman will share the results

Read More

Tomorrow’s Endpoint Protection Platforms

Why common endpoint security can’t beat modern threat

Read More

How Do You Spell Credential Theft Protection…EPP, NGAV, OR EPM?

It’s 2017 and time to realize that cyber attackers ha

Read More

Forget the kids. We need this for IT Automation.

Our youngest is nine (AND A HALF! DON’T FORGET THE HA

Read More

JavaScript Lost in the Dictionary

Check Point threat Intelligence sensors have picked up

Read More

Network Defense, Powered by XGen™ security

Comprehensive security The threat landscape continues t

Read More

Overcoming IT barriers to digital transformation

The end user experience is essential to a successful di

Read More

Cloud Security Attack – Fancy Hare

IT Security Leaders know their network and endpoints in

Read More

EUC Decoder Ring for the HCI Buyer

In this post, I’m going to talk about the evolution o

Read More

Palo Alto Networks Meets With Pentagon and International Officials

Last week Palo Alto Networks had the honor of meeting w

Read More

4 Ways vADC Can Transform Your Business

Chances are, your company has a hybrid IT environment c

Read More

Gone Phishing, A Case Study on Conducting Internal Phishing Campaigns

To many, emails are boring. It’s been a long time sin

Read More

Data Protection and the GDPR Job Market

The May 2018 deadline for full GDPR compliance will b

Read More

Law v. Technology

A great number of the cases that make it to the United

Read More

Android Click-Fraud Apps Briefly Return to Google Play

Click-fraud apps frequently appear on Google Play and t

Read More

What’s New with MobileIron EMM

We are excited to bring you another new release of Mob

Read More

Cloud Chaos, the Identity and Access Control Conundrum

As you deliver more cloud-based applications, managing

Read More

People Are the New Security Perimeter – Introducing ForcePoint UEBA

I’ve written recently about how cybersecurity has t

Read More

FireEye Summer Demo Series August 15 – September 28

Innovative FireEye technologies continue to set the sta

Read More

Why Pervasive Visibility is So Important

Please join us as Gigamon CMO, Kim DeCarlis, walks you

Read More

The Network. Intuitive. Explained.

Introducing an entirely new era of networking. Constant

Read More

SandBlast Mobile Teams With Microsoft Intune

Cyberattacks have evolved beyond the enterprise perime

Read More

The Unified Endpoint Gold Standard: Citrix Receiver, XenApp and XenDesktop

With all the buzz about unified endpoints, you can be f

Read More

2017 Gartner Market Guide for Privileged Access Management

The 2017 Gartner Market Guide for Privileged Access Man

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader!

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

NetApp Vision for NVMe over Fabrics and Storage-Class Memory

Flash is powering the digital transformation. New emerg

Read More

Riverbed Improves ‘Digital Experience Management’ with Latest SteelCentral Update

Companies of all kinds continuing to invest heavily in

Read More

OSX.Pwnet.A – CS, GO Hack and Sneaky Miner

We recently found a hack for Counter-Strike: Global Of

Read More

The Key to Encryption. Simple for Government Leaders; Difficult for Attackers

Over the last few decades, the U.S. government created

Read More

Challenges of Big Data Security

Database security best practices are also applicable f

Read More

Why Human-Machine Teaming Will Lead to Better Security Outcomes

Artificial intelligence and machine learning have never

Read More

Streamline daily workflows to drive business

Move beyond inefficient, paper-based processes with mob

Read More

F5 on AWS: How MailControl Improved their Application Visibility and Security

Organizations like MailControl often discover they need

Read More

Comparing the Push for Anti-Encryption and Cyber Sovereignty

An unintended consequence of the push for government ac

Read More

Forcepoint A Leader in Gartner 2017 Magic Quadrant for Enterprise DLP Nine Consecutive Times

Gartner has once again positioned Forcepoint as a leade

Read More

No More Network Blind Spots: See Um, Secure Um

East Coast summer nights of my childhood were thick wit

Read More

CyberArk & ForeScout Secured, Enables an In-Depth Credential-Protected Discovery Process

Learn how the CyberArk-ForeScout CounterACT™ integrat

Read More

Cisco 2017 Midyear Cybersecurity Report

Discover the latest cybersecurity vulnerabilities and s

Read More

Preparing for the Workspace of the Future

Future work environments will no longer tether employee

Read More

Measuring the Usefulness of Multiple Models

The past several years have seen a massive increase in

Read More

Are Your Apps Chasing Users Away?

How to Deliver Superior Digital Experiences Users expec

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader!

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

Frost & Sullivan Define How Pulse Secure is Differentiated in the NAC Global Market

Larger technological developments have made NAC solutio

Read More

Addressing Data Across Borders for the GDPR

Most enterprises today do business across the globe, ha

Read More

Mastering the Endpoint, A Forrester Report

Organizations now monitor 10 different security agents

Read More

Mobile Document Management with Docs@Work

Content is the lifeblood of the enterprise. Today compa

Read More

How to Perform Continuous ONTAP Upgrades Without Sacrificing IT Stability

Don’t be surprised if you see the NetApp IT storage t

Read More

Kevin Mandia, CEO of FireEye, Speaks at DoDIIS17 About Cybersecurity

Kevin Mandia, CEO of FireEye, talks about Russia, China

Read More

Notes From DODIIS 2017: Talking Cyber Espionage and Insider Threat

Read on for a sneak peek into some of the Insider Threa

Read More

Quantum Computing? Really?

We just had an interesting discussion here about quantu

Read More

Cisco and IBM collaborate to increase security effectiveness

On May 30, 2017, Cisco and IBM Security announced a ke

Read More

The growing U.S. IT productivity gap

Productivity growth has slowed down despite our rising

Read More

Locking Down the Remote Vendor Attack Pathway Through Privileged Account Security

Remote vendors are everywhere, and they’re not limi

Read More

F5 on AWS: How MailControl Improved their Application Visibility and Security

Organizations like MailControl often discover they need

Read More

Interested in SD-WAN?

Watch this video with SiliconANGLE to learn how to desi

Read More

How to Build Your Endpoint Security Blueprint

Date and time: August 23rd, 2017 at 10am PT | 1pm ET S

Read More

To Upgrade or Not to Upgrade Your Hardware, that Is the Question

When you think of security, you probably think “softw

Read More

Are You Prepared for the Next Attack?

A WAKE-UP CALL From WannaCry and Petya to the most rece

Read More

Network Security in the Amazon Web Services Cloud – It’s Your Responsibility!

There is a presiding notion that because established cl

Read More

Back Up Your SaaS Data with NetApp Cloud Control for Microsoft Office 365

Unless something goes really wrong, IT rarely makes hea

Read More

Preventing Cybercrime Through Collaboration and Information Sharing

Cybercrime is not something that any one entity can tac

Read More

Securing the Digital Dream

Secure SD-WAN opens the door to digital transformation

Read More

Under Armour on Top of Network Security

Real, hands-on experience always supersedes any marketi

Read More

Still Using Stateful Tokens? There is a Better Way!

Lately, with regards to tokenization, we’ve been seei

Read More

A Leader for Four Consecutive Years in the Gartner Magic Quadrant for WAFs

Gartner has published their 2017 Magic Quadrant for Web

Read More

Balance Speed & Agility With Security & Compliance

Developers are shifting to a DevOps delivery model to i

Read More

Citrix Positioned as a Leader in IDC MarketScape Report

What being a leader means and why it matters to custome

Read More

The Hunt for IoT, The Rise of ThingBots

The Internet of Things (IoT) and, specifically, the hun

Read More

The CISO’s Most Effective Weapon, Threat Intelligence

Today’s most successful CISOs embrace cyber threat in

Read More

Re-Thinking the Cyber Consolidation Paradigm

The Battle of Consolidation vs. Best-of-Breed, does mor

Read More

SentinelOne Demo

Want Zero-Day protection? Watch this video & see ho

Read More

BakerRisk Provides a Deep Dive Into Risk Management Engineering

Baker Engineering and Risk Consultants, Inc. (BakerRisk

Read More

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

In our previous blog posts about AMP and Threat Grid on

Read More

MobileIron customers are all-in on Apple for business transformation

In Apple’s Q2 earnings call, Luca Maestri stated that

Read More

Three Simple Questions You Should Ask Every Flash Vendor About NVMe

In the coming years, every major storage vendor will be

Read More

Risk Remediation is Easy with Aperture

Learn more about SaaS security:

Read More

A new vADC chapter is written

A new chapter for a visionary disruptor: Today, the vAD

Read More

Everyone Needs Better Network Visibility

I just returned from a busy week in Las Vegas attending

Read More

Has storage and server encryption kept pace with modern IT to adequately reduce risk?

Storage and server vendors seem to be stuck with the hi

Read More

Challenges of Big Data Security – Whiteboard Wednesday [Video]

Database security best practices are also applicable f

Read More

New Surveillance Malware “FruitFly” Is a Nearly Undetectable Mac Backdoor

Mac malware outbreaks used to be viewed as a rarity. Ho

Read More

Get a Competitive Edge with Digital Workspaces — Oxford Survey Result

A recent survey by Oxford Economics reveals a satisfy

Read More

Privileged Access Management, A Matrix Approach for Account Ranking and Prioritization

Throughout the course of my six years in helping KPMG

Read More

F5 CTO Ryan Kearny and SVP Calvin Rowland discuss cloud trends at F5Agility17

F5 Chief Technology Officer Ryan Kearny shares insights

Read More

GDPR – The Final Countdown

With under a year to go until the regulation becomes en

Read More

Riverbed and Xirrus—Raising the Bar for Mobile Application Performance

The April 2017 merger of Riverbed and Xirrus brought

Read More

Measuring the Usefulness of Multiple Models

The past several years have seen a massive increase in

Read More

Cyber Attacks Can Be Prevented

Based on the latest news headlines —from WannaCry to

Read More

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

When business leaders think about the Internet of Thing

Read More

Clustering and Dimensionality Reduction: Understanding the “Magic” Behind Machine Learning

These days we hear about machine learning and artificia

Read More

Threats are changing. Your SOC should, too.

Analytics-driven. Human+machine teaming. The next evolu

Read More

MobileIron Continues Track Record of Security Innovation with 55th Patent

MobileIron, the security backbone for the multi-cloud

Read More

How the Next-Generation Security Platform Contributes to GDPR Compliance

The General Data Protection Regulation is the European

Read More

On-demand Webcast: Next Generation Cyber Security

In this short webcast, Gigamon CTO, Shehzad Merchant, p

Read More

Forcepoint Simplifies Cybersecurity Through Cloud-Based Behavior Analytics

New Forcepoint CASB behavior analytics help enterprise

Read More

Encryption for Data-at-Rest Leveraging OASIS KMIP

As a universally-accepted best practice, there is no su

Read More

Tackle and Simplify IT – Adopt a Secure Digital Workspace

As a member of the Cloud Services team at Citrix, I hea

Read More

The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services

Today’s highly motivated cyber attackers continually

Read More

Are Your Apps Stressing Out Users with Poor Performance?

A recent survey finds 27% of users claim poor performan

Read More

Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science

Many attackers continue to leverage PowerShell as a par

Read More

Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

Latest SteelCentral release closes the visibility gap b

Read More

Introducing Check Point SandBlast Mobile for Microsoft Intune

If your enterprise is using Microsoft EMS and is lookin

Read More

The Weather Report: Seamless Campaign, LuminosityLink RAT, and OG-Miner!

In our first ever Cisco Umbrella Security Weather Repor

Read More

Disrupting the Disruptors, Art or Science?

Security professionals are in a fight every day to trac

Read More

App Wrapping and Containerization by AppConnect

MobileIron AppConnect containerizes apps to protect cor

Read More

10 Good Reasons to Upgrade to ONTAP 9.2

NetApp® ONTAP® 9.2 was released in May 2017 and went

Read More

Conversations on Securing Microservices, API Gateways and Containers

Last month, I met James (name changed) while at AWS Su

Read More

Format-Preserving Encryption Summer Reading

Hello again, format-preserving encryption enthusiasts a

Read More

Perspectives on the New Defender Lifecycle Model, A Q&A with Gigamon CTO Shehzad Merchant

In his blog “Moving Toward a Security Immune System,

Read More

Forcepoint Cloud Security Reaches “FEDRAMP IN PROCESS” Phase

In a cloud-first world, advances in technology constant

Read More

Circumventing Application Whitelisting and Misplaced Trust

Application whitelisting has been an advantageous techn

Read More

Auto Retailer Drives Growth with Citrix Cloud

Clint Newell Auto Group was at a crossroads. Existing I

Read More

In EternalPetya’s Wake, How Could Regulators Punish Victims?

The EternalPetya (aka NotPetya, NonPetya, ExPetr) vir

Read More

SentinelOne Virtual Appliance, Cloud When You Want It, On-premises When You Need It

We are pleased to announce the immediate availability o

Read More

SD-WAN vs. MPLS

Keeping up with traditional management approaches for w

Read More

Cloudy Forecast, Are you Naked in the Cloud?

What do high-clearance government employees, telecommun

Read More

Cisco Cybersecurity Report, Exploit Kits Down, Email Malware Up

Cisco released its 2017 mid-year cybersecurity report

Read More

Up and to the Right, NetApp Moves Up in 2017 Gartner Magic Quadrant for Solid State Arrays

Gartner recently released its July 2017 Magic Quadrant

Read More

Finding the Value of ‘Intangibles’ in Business

We modeled the Cybersecurity Canon after the Baseball

Read More

Secure Access Solutions for Mobile, Cloud and Internet of Things – Latest Release

Embrace the latest cloud, mobile and IoT technologies w

Read More

New GDPR-Focused Media Hub Launched By IDG/CIO and Hewlett Packard Enterprise

Do you have questions regarding the pending enforcement

Read More

Uncover Sensitive Data with the Classifier Tool

Understanding what sensitive data resides in your enter

Read More

McAfee June Threats Report

Malware evasion techniques and trends Malware developer

Read More

NSS Labs NGFW Test: Is your firewall a top performer?

NSS Labs leads the industry in third-party assessments

Read More

Rethink Your Access Strategy, Think BeyondCorp

Years ago, Forrester declared dead the old security ma

Read More

Cloud Security Use Cases – A Panel Discussion

July 25 / 2PM EST Insights via use cases and lessons le

Read More

A Closer Look at SentinelOne

Date and time: July 20th, 2017 at 10am PT | 1pm ET Spe

Read More

Comparing Four End User Experience Monitoring Methods

Truth be told, the lines between End User Experience M

Read More

Database Updates, Backup/Restore and Collecting Troubleshoot with Firepower Device Manager

This video walks through the process of updating the va

Read More

FlexPod Survival Guide, The Start of an IT Revolution

Do you know the Beatles song “Revolution”? The lyri

Read More

Top Insider Threat Concern? Careless Users

It’s been a busy year thus far in the cybercrime worl

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

Prevent Threats of IoT from Sneaking Past Your IT Team

The Evolution of IoT Business and consumer industries h

Read More

The Power of an Integrated UEBA/SIEM Solution

If you’ve read our previous blog, “Leveraging UEBA

Read More