The Latest in IT Security

Posts Tagged ‘Advanced’

Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures. In my travels over the last six months, meeting with customers across many vertical markets, I have heard a growing concern about the inability to make cyber defensive strategies more proactive. The common complaint is […]

Read more ...

#microsoft has acquired security company #adallom in a bid to give IT departments more control over application access and data stored across cloud services. The growing popularity of cloud services and the move of critical apps from in-house data centers is putting pressure on vendors to offer more #advanced #management tools. With the acquisition of […]

Read more ...

People much smarter than me once said, “great defense requires understanding the enemy.” And man, that sounds wise as hell! That’s like long bearded dude on a mountaintop type of wise. And so we run with that and turn it into a training class, just like someone turned the profound wisdom of “there’s plenty more […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments