Quantcast
Channel: INTERFACE Tour
Browsing all 10 articles
Browse latest View live

Keynote: The Evolution of Hacking… All Your Data Still Belongs to Us.

Enterprise security can be described as a game of chess. When new defensive measures are introduced to combat an existing threat or vulnerability, it’s inevitably in response to a newly released or...

View Article



Keynote: The Genesis of Your Next Security Incident

The next attack on your organization is closer than you think. While you are attending meetings and complaining about the quality of coffee in the break room, the genesis of your next security incident...

View Article

Shamoun Siddiqui: Elements of a BYOD Program

Guest Post: Shamoun Siddiqui, PhD, CISSP Recent years have witnessed a veritable revolution brought about by the consumerization of Information Technology. At the heart of this consumerization is a...

View Article

Image may be NSFW.
Clik here to view.

Shamoun Siddiqui: Cloud Security – A Prescriptive Approach

Guest Post: Shamoun Siddiqui, PhD, CISSP Shamoun Siddiqui is currently the Director of Information Security at Sabre, Inc in Southlake, TX. He possesses a Bachelor’s and a Master’s degree in Mechanical...

View Article

Image may be NSFW.
Clik here to view.

Whitepaper: Toxic War Rooms

  Toxic War Rooms Today’s IT teams face ever increasing challenges as they seek to navigate the complexities of independent systems. When issues arise in organizational networks, the complexity of the...

View Article


Image may be NSFW.
Clik here to view.

Whitepaper: Protect your Company from a Data Breach

Check List: 10 Ways to Protect your Company from a Data Breach As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other...

View Article

Image may be NSFW.
Clik here to view.

Whitepaper: Data Center Trends & Network Security Impact

  Data Center Trends and Network Security Impact The Data Center is rapidly evolving with recent trends such as Virtualization, Cloud computing, Software Defined Networks (SDN), and Network Function...

View Article

Image may be NSFW.
Clik here to view.

Whitepaper: Big Threats for Small Businesses

  Big Threats for Small Businesses: Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals Cybercriminals know there’s nothing small about small to midsize businesses (SMBs)....

View Article


Image may be NSFW.
Clik here to view.

Whitepaper: Hyper-V Virtual Lab Tips and Tricks

  Hyper-V Virtual lab Tips and Tricks While many backup administrators understand the importance of testing their backups, comprehensive testing can be elusive. Microsoft Hyper-V can help make lab...

View Article


Image may be NSFW.
Clik here to view.

Whitepaper: Controlling APTs Using the Next-Generation Firewall

  Controlling Advanced Persistent Threats Using the Next-Generation Firewall This paper first describes the current threat landscape and then introduces a model for enterprises to protect themselves...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images