Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs Network segmentation isn’t new. Companies have relied on firewalls, virtual local area networks (VLAN) […]
Ready for the EU’s GDPR compliance deadline? Many companies aren’t | Salted Hash Ep 16
CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.
Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves
Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why ‘serverless’ computing is a boon to devs and wonders why Apple’s HomePod seems late to the game.
Tech Talk: The beginning of the end of the password in 2018
Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password security.
The moving target of IoT security
As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure […]
Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]
Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]
VMware: Leading our Industry into a Software-Defined Future with Strategic M&A
At VMware, we’ve been a pioneer and leading innovator in “software defined” for nearly two decades. To get there, we have championed our own internal innovation, and augmented those efforts with acquired technologies. Previously, I outlined our three key tenets of our M&A strategy – platform acquisitions, industry acceleration acquisitions, and technology tuck-ins. This strategy […]
VMware: Leading our Industry into a Software-Defined Future with Strategic M&A
At VMware, we’ve been a pioneer and leading innovator in “software defined” for nearly two decades. To get there, we have championed our own internal innovation, and augmented those efforts with acquired technologies. Previously, I outlined our three key tenets of our M&A strategy – platform acquisitions, industry acceleration acquisitions, and technology tuck-ins. This strategy […]
Citrix XenDesktop Essentials Makes Migrating to Windows 10 Easy and Inexpensive
Now you can deliver a Windows 10 Enterprise desktop powered by Citrix HDX technology for as little as $32.72 per user per month, and that includes the costs for both Citrix software and Azure resources! Last month I wrote a blog post on our recently published whitepaper, “XenApp Essentials Total Cost of Ownership Analysis.” The […]