Shadow IT – Security and DR concerns? According to Gartner, on average, 28 percent of IT spend occurs outside the IT department today. IT behind IT’s back, Prakash Sinha |September 06, 2016
Securing Online Assets: Four Steps to Protect Your Online Business Businesses of all sizes, across all verticals, generate significant sales online, increasing their risk and exposure from outages and breaches. Radware |August 25, 2016
“POP” Goes the Vendor that Doesn’t Separate Scrubbing Centers from Always-On Platforms It seems hardly a week can pass without some cloud-based security service provider announcing the latest expansion of their cloud Ben Desjardins |June 01, 2016
Static Cloud Security Is Obsolete; Long Live Continuously Adaptive Cloud Security! Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules all the time… Haim Zelikovsky |May 17, 2016
Virtualizing the ADC – Molding Mature Technologies for the Cloud Virtualization of existing technologies is an evolutionary step in the development of cloud designs. The cloud is supposed to be Frank Yue |April 05, 2016
Themes, Conversations and Takeaways from 2016 RSA The hackers are winning.Or said more accurately, strong security is losing . . . sometimes to itself. That seemed to Ben Desjardins |March 10, 2016
Don’t Let the Headlines Cloud Your Security Architecture Decisions Information security professionals can hardly be blamed for a recent over-emphasis on looking to cloud-based solutions for protection for both Ben Desjardins |September 03, 2015