Skip to content

What Can Smartphones Teach Us about the Future of Data Centers?

Man Holding Smartphone

A couple of weeks ago, I had an amazing and interesting day that got me thinking about what might be the future of Enterprise DC infrastructure.

The first amazing thing was watching our daughter’s reactions when my wife and I bought her first phone; she was so excited. The second interesting thing happened that evening as I watched a primetime NBA game. During a commercial break, for the first time, I saw a Dell Technologies ad for integrated, one-stop-shop Enterprise DC infrastructure.

Continue Reading →

Your Enterprise Is Going Hybrid … How Do You Secure Information Technology?

 

The Word Hybrid Written in Clouds

Over the last few months, I have been in many discussions with Enterprise CIOs and CISOs after they have realized the security and visibility challenges they now face after committing to fully and formally adopting a hybrid architecture for their Enterprise ITs.

These discussions have been fascinating and stimulating and have had an uncanny amount of similarity regardless of enterprise size, market segment, industry vertical or even enterprise age. (However, it’s worth noting that all of these customer conversations have been with organizations that are old enough to have a significant on-premise infrastructure IE that’s at least a few years old).

The story arc for all of them is similar, with a similar set of systemic challenges now facing these organizations. Let’s take a look at how they got here and the options they have going forward.

Continue Reading →

3 Hot Trends in Cybersecurity the C-Suite Is Talking About Right Now

computer-keys

Cybersecurity sometimes feels like a game of cat and mouse—new technologies and even familiar hacker capabilities are constantly testing protections, and requiring the security sector to put out and prevent potentially destructive attacks.

Today, we’ll look at three of the top issues in cybersecurity that the C-Suite is talking about right now, and suggest some ways you can prepare.

Continue Reading →

How Do I Know That My Network’s Data Is Really Secure?

Man with Tablet Covering Face

You don’t have to be a chief information security officer (CISO) to fear having accounts compromised; however, being a CISO takes worry to another level altogether.

How do you sort through all the log information that applications, networks and people are generating on a daily basis? Do you even track all your personal logins? Imagine doing this for a major enterprise!

Hackers, for the most part, are not spending a lot of time “guessing” your corporate passwords. They simply do not invest that much time on their targets; instead, they automate using your compromised passwords to find where they can gain access to your system.

Other areas that interest hacktivists or cybercriminals are phishing scams, Trojan horses and using open Wi-Fi services, to name a few.

Continue Reading →

3 Spooky Ways Your Systems Are Getting Hacked Right Now

spooky-hand
It’s that time of year, and unfortunately, cybercriminals are all tricks, no treats. Despite the fact that security spend continues to rise, so do security incidents. In this post, we’ll look at top vulnerabilities and security incident trends to understand three common ways attackers are getting into organizations right now.

Continue Reading →

Now There’s an Easy Way to Secure Your Legacy Applications

2016-10-18_blog-975px
I was with a colleague at lunch a few months back and this discussion came up in excruciating detail. The issue specifically had to do with security and compliance for old or “legacy applications” that are sitting on older versions of Windows or Red Hat.

The problem is one we hear often: the application was written by either someone who has moved on to another position, doesn’t work there anymore or was written by a company that went under or decided to end-of-life (EOL) the application.

What do you do when the vulnerability scanner run by your security department detects up to 600 applications that are out of compliance? In most cases, the security organization will want these applications either upgraded or moved off your network.

This isn’t always possible due to the criticality of most of these applications. Often, they are critical to run the day-to-day operations of the company or they are critical to the well-being of the organization.
Continue Reading →

1 2 6