As we approach the end of the calendar year, a variety of predictions on information security and network security trends for 2014 will take...
Hi, what are you looking for?
As we approach the end of the calendar year, a variety of predictions on information security and network security trends for 2014 will take...
Every organization is a potential target for a cyberattack. The impact can be devastating, from loss of data and customer trust to significant financial...
The evolution of cyberattacks towards stealthy, targeted, persistent threats that use a cocktail of techniques is well recognized. This new set of attackers, consisting...
In a previous SecurityWeek column in May of this year, I wrote about “Network Security Considerations for SDN”. As described in the article, SDN...
At VMworld last month, VMware announced the new NSX network virtualization platform to much fanfare. There was certainly a great deal of excitement at...
August is a special month for those of us who live in the San Francisco area, because it’s when the masses of geeks descend...
While many organizations today are looking to build private cloud infrastructures in-house, the reality is that the majority will end up with a hybrid...
In a previous SecurityWeek column, I wrote about the security considerations for software defined networking (SDN). Whether or not SDN becomes the next evolution...
Cyber-attack headlines in the last couple of months read like a summer blockbuster novel filled with espionage, international hackers and advanced weapons systems. In...
What are the New Considerations for Securing a Software Defined Network?
No matter which way you slice and dice the numbers, the data center is typically one of the most costly items within an enterprise...
While there are Multiple Considerations to Secure Mobile Traffic, it’s the Network Where You Must Start...