Cybersecurity Blog

How to Overcome VMware NSX Security Deployment Challenges

This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements...


( read )

Tags: data breach, cybersecurity, data protection

Austin is a fun place to visit, in part because there is so much going on. While that’s not necessarily news to people who...


( read )

Tags: cyber attack, data breach, gdpr,

VMware and NSX: You Can’t Have Your Cake and Eat It Too

This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully...


( read )

Tags: cyber attack, data breach, cybersecurity,

Why You Need a Data Breach Response Plan

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner...


( read )

Tags: data breach, cybersecurity, data protection

A New Twist on Data Privacy Regulations - Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a...


( read )

Tags: data breach, gdpr, cybersecurity,

The Channel Partner's Role in Data Privacy Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their...


( read )

Tags: cyber attack, data breach, cybersecurity,

The Effects of WannaCry Ransomware on Your Critical Data

WannaCry? Only if you lose your most critical data.

Last week’s attack has many people wondering: DzI wanna know if my critical...


( read )

Tags: cyber attack, data breach, cybersecurity,