More and more companies are deploying production workloads to the cloud (in all of its definitions), and that’s a very good thing. Unfortunately, this shift has highlighted an area where we–the information security community–are a little weak. That weakness is in sharing best practices and discussing the ups and downs of operating security in hybrid…Read More
Massive IT transformation has been happening to the enterprise significantly since the advent of machine virtualization in the mid 2000’s. This set the wheels in motion for Cloud Computing. We are at the precipice with Cloud and mobile computing. Through all of this innovation and mass disruption in our business realms, we are starting to…Read More
Major SSL/TLS were recently discovered in iOS, OS X and Linux.
We’ve heard the phrase “it can happen to anyone” many times in life in many different contexts. The point of the saying is to humble us and remind us that no matter how smart and careful we are, bad things can still happen to us. We’re not so smart and careful that we can control…Read More
February is a month when love is in the air. When Valentines sweethearts woo each other with gigantic bouquets and luxurious chocolates. It’s also the month that our VP of Technology and Solutions JD Sherry warned attendees of RSA Conference 2014 of a different kind of romance at work in cyber space, in his presentation,…Read More
WhatsApp has a history of troubles with encryption and data privacy
While I was at Mobile World Congress in Barcelona last week, I had to explain a few times to different people why there is a need nowadays to protect your mobile phone. I thought, “why not make a blog out of the topic while I have it fresh?” I could be telling you how stats…Read More
Last fall, AWS launched AWS Activate. This program helps make it easier for startups to get up and running on AWS by providing access to resources tailored to their specific needs. We’re always looking for new ways to team up with AWS, and we’re happy to announce that the latest update to the program now…Read More
The BYOD Security Challenge for Small and Midsize Businesses There’s a growing security issue for small and midsize businesses (SMBs) that’s called BYOD. The trend of “bring your own device” to work — defined as employees using their own smartphones, laptops or tablets for business tasks— is becoming a major challenge for all organizations. However,…Read More
The Obama Administration recently unveiled the Cybersecurity Framework, a guide for protecting critical national infrastructure such as electrical grids and water and fossil fuel supplies from cyberattacks.