When all is too much
Hi, what are you looking for?
When all is too much
Can’t hack this? Oh yes, they can. A few months back when New York Magazine’s Kevin Roose dared (see embedded video below) a couple of expert...
A German steel mill, a Ukrainian power grid, and an American dam all walk into a bar... Okay, so what could be the beginning...
“What’s the cut, Papa?”“Juicy, Junior. Real juicy.”
Cryptography isn’t new. Humans have always liked to keep secrets. Or at least try. More than 400 years ago, Mary, Queen of Scots, tried....
Remember that line from Alan Turing in the movie The Imitation Game? The moment he realized the significance of C-I-L-L-Y?
Like leg warmers, data loss prevention (DLP) is back. Unlike leg warmers, DLP is actually cool, increasingly sophisticated, and something, to steal from Tim...
What is SDN and Why Is Traffic Visibility Important to Security?
The description leaps off the pages like a Hollywood blockbuster in the making.
How can you defend against attacks that leverage automation and are outpacing alerting mechanisms and manual-access controls?
IT Managers Aren’t The Only Ones Aware of The BYOD Trend – Attackers are Too! Is Your Security Strategy Ready?This article is the third...
Second in a Series on Evaluating New Firewalls: Why Scalability is Important to Sustain Protections through Network Growth and Scale.I realize it may sound a...
When Evaluating Firewalls, Understand What the Choices Mean in Terms of Benefits and Trade Offs for your Network.Maybe like me, you remember the early...
What Do 4G/LTE Networks' Entirely New Infrastructure Mean for Security?By now, we’ve all seen the uncharacteristically techie ads for 4G/LTE phones and services. Even...
Before there was concern over VM stall, there was that of VM sprawl.VM sprawl had organizations worrying that so many virtual machines would be...
Early this month, Juniper Networks conducted an informal survey on the show floor of VMworld 2011. The survey, which garnered responses from some 60...
Antivirus Strategies for Virtualized EnvironmentsWe know by now that virtualized data centers and cloud deployments require more than the traditional physical security measures. They...
Cell phone hacking is big news as of late. Recently, scandal has rocked News of the World and The Daily Mirror. These two British...
Has the U.S. Government Landed itself on the Cutting Edge of Technology?