Cybersecurity Blog

Featured Post

The Dark Side of a DevOps Environment

Once considered cutting-edge, agile DevOps approach is now recognized by organizations seeking to deliver applications faster and with fewer operations issues. The industry results speak for themselves — a 2016 State of DevOps Report showed that organizations that adhere strongly to agile DevOps...


( read )

Tags: secdevops, cybersecurity, data protection

How to Overcome VMware NSX Security Deployment Challenges

This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements...


( read )

Tags: data breach, cybersecurity, data protection

Austin is a fun place to visit, in part because there is so much going on. While that’s not necessarily news to people who...


( read )

Tags: cyber attack, data breach, gdpr,

VMware and NSX: You Can’t Have Your Cake and Eat It Too

This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully...


( read )

Tags: cyber attack, data breach, cybersecurity,

Why You Need a Data Breach Response Plan

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner...


( read )

Tags: data breach, cybersecurity, data protection

A New Twist on Data Privacy Regulations - Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a...


( read )

Tags: data breach, gdpr, cybersecurity,

The Channel Partner's Role in Data Privacy Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their...


( read )

Tags: cyber attack, data breach, cybersecurity,

Reap the benefits of IoT without Compromising SCADA security

Industry 4.0 is the term used to describe the fourth industrial revolution, which is the future of industrial production based on...


( read )

Tags: cyber attack, cybersecurity, intrusion response,