Tags: secdevops, cybersecurity, data protection
          Tags: cyber attack, data breach, cybersecurity,
          Once considered cutting-edge, agile DevOps approach is now recognized by organizations seeking to deliver applications faster...
Tags: secdevops, cybersecurity, data protection
          This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements...
Tags: data breach, cybersecurity, data protection
Austin is a fun place to visit, in part because there is so much going on. While that’s not necessarily news to people who...
Tags: cyber attack, data breach, gdpr,
          This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully...
Tags: cyber attack, data breach, cybersecurity,
          Tags: cyber attack, cybersecurity, IoT,
          The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner...
Tags: data breach, cybersecurity, data protection
          Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a...
Tags: data breach, gdpr, cybersecurity,
          Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their...
Tags: cyber attack, data breach, cybersecurity,
Enter your email address to subscribe to this blog and receive notifications of new posts by email.