To ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need…
Read MoreResearch
Deception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreKey Criteria for Evaluating Enterprise HCI
IT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the…
Read MoreVoices in DevOps – Episode 10: A Conversation with Liz Rice of Aqua Security
Jon Collins speaks with Liz Rice on the use of DevOps in building Security Platforms. Jon Collins speaks with Liz Rice…
Listen NowLeveling Up DevOps Security
Cybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation…
Read MoreRight Size Security – Episode 5: Bug Bounties
In this episode of Right Size Security, Simon and Steve discuss bug bounties, penetration testing, some of the tools used to…
Listen NowVoices in Cloud – Episode 10: A Conversation with Wendy Nather of CISCO
In this episode of Voices in Cloud, David speaks with Wendy Nather of CISCO about her more than 30 years in…
Listen NowRight Size Security – Episode 4: Advance Behavior Analysis and Threat Detection
In this episode, Simon and Steve discuss what ABA or next-gen SIEMs tell you, how they evolved, and what you need…
Listen NowRight Size Security – Episode 3: Deception Technology
In this episode of Right Size Security, Steve and Simon discussion deception technology. Why do you want it? What are the…
Listen NowAdvanced Behavioral Analytics and Threat Detection: Next-Gen Info Security and Network Defense
The ability to detect events and determine their intent — good versus bad — is crucial to information security and network…
Read MoreData Protection and Data Management Vendor Review of Veeam: Customer-Focused, Future Forward, Feet on the Ground
Last week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status…
Read More