Are we losing the fight against malware and the hackers who are making every day a zero day? Few authors are as skilled as GRRM when it comes to killing off important characters. Clearly, that oft-uttered phrase from the eastern continent, “… Read More…

Getting funding and support is a process Successful security leaders count on support and funding in order to provide the services and drive projects that create value. It’s important to distinguish between budgets and funding. Budgets tend to be line-item actions and amounts, decided in advance. The process of budgeting often feels mysterious, the final …

The process security leaders need to get the funding and support you wantRead More »

Field computing presents many unique challenges not found in the typical office environment. Dropped devices, overheating, freezing, and simple wear and tear are all common hazards faced by field equipment. If applications from multiple operating systems are required in the field, the additional field hardware presents a significant liability. However, advances in tablet computing now …

Ruggedized Dual Boot Handheld Tablets For Field UseRead More »

In 1982, at the height of the Cold War, a vast explosion, visible from space, lit up Siberia. NORAD and others in the U.S. defense establishment worried: was this a nuclear test, or a missile being launched from a region where nobody had suspected that missies were stored? But no: it turns out the explosion, …

Inside the rickety, vulnerable systems that run just about every power plantRead More »

EXPERTS DEBATE WHETHER ADVICE GOES FAR ENOUGH Experts debate the value of new PCI guidance for how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Does the new advice go far enough? Read More…

SUNNYVALE, CALIF., MARCH 25, 2015 – Fortinet(R) (NASDAQ: FTNT), a global leader in high-performance cyber security solutions, announced today that its broad network security training and certification program is being adopted across the globe at rapid scale, as companies look to expand their knowledge and expertise in protecting critical assets from cyber attacks. Read More…

Enterprise and consumer hardware has advanced in the last few years to the point that anything with moving parts becomes a significant bottleneck for data transfer. Hard disk drives (HDDs) are often the “weakest link” in serving information from a data center to the end user. In high IO environments (such as virtual desktop infrastructures), …

SSD vs HDD: Benefits of a Solid State DriveRead More »