The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”
April 1, 2014
Security intelligence and changes in the nature of security risk were driving conversations and solutions at the 2014 RSA Conference – What will your C-Suite want to know?
The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices leaves enterprises open for cyber attacks.
March 1, 2014
The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices – not just laptops but medical equipment, printers and surveillance cameras – leaves enterprises open for cyber attacks.
Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.
Technology has become ingrained in enterprise security operations.
December 1, 2013
Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.
The signs are all around that Big Data is the first major post-cloud technology that can change our useof data as much as the cloud has changed the way we deploy it.