Tags: secdevops, cybersecurity, data protection
Tags: cyber attack, data breach, cybersecurity,
Once considered cutting-edge, agile DevOps approach is now recognized by organizations seeking to deliver applications faster...
Tags: secdevops, cybersecurity, data protection
This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements...
Tags: data breach, cybersecurity, data protection
Austin is a fun place to visit, in part because there is so much going on. While that’s not necessarily news to people who...
Tags: cyber attack, data breach, gdpr,
This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully...
Tags: cyber attack, data breach, cybersecurity,
Tags: cyber attack, cybersecurity, IoT,
The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner...
Tags: data breach, cybersecurity, data protection
Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a...
Tags: data breach, gdpr, cybersecurity,
Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their...
Tags: cyber attack, data breach, cybersecurity,
Enter your email address to subscribe to this blog and receive notifications of new posts by email.