Keynote: The Evolution of Hacking… All Your Data Still Belongs to Us.
Enterprise security can be described as a game of chess. When new defensive measures are introduced to combat an existing threat or vulnerability, it’s inevitably in response to a newly released or...
View ArticleKeynote: The Genesis of Your Next Security Incident
The next attack on your organization is closer than you think. While you are attending meetings and complaining about the quality of coffee in the break room, the genesis of your next security incident...
View ArticleShamoun Siddiqui: Elements of a BYOD Program
Guest Post: Shamoun Siddiqui, PhD, CISSP Recent years have witnessed a veritable revolution brought about by the consumerization of Information Technology. At the heart of this consumerization is a...
View ArticleShamoun Siddiqui: Cloud Security – A Prescriptive Approach
Guest Post: Shamoun Siddiqui, PhD, CISSP Shamoun Siddiqui is currently the Director of Information Security at Sabre, Inc in Southlake, TX. He possesses a Bachelor’s and a Master’s degree in Mechanical...
View ArticleWhitepaper: Toxic War Rooms
Toxic War Rooms Today’s IT teams face ever increasing challenges as they seek to navigate the complexities of independent systems. When issues arise in organizational networks, the complexity of the...
View ArticleWhitepaper: Protect your Company from a Data Breach
Check List: 10 Ways to Protect your Company from a Data Breach As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other...
View ArticleWhitepaper: Data Center Trends & Network Security Impact
Data Center Trends and Network Security Impact The Data Center is rapidly evolving with recent trends such as Virtualization, Cloud computing, Software Defined Networks (SDN), and Network Function...
View ArticleWhitepaper: Big Threats for Small Businesses
Big Threats for Small Businesses: Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals Cybercriminals know there’s nothing small about small to midsize businesses (SMBs)....
View ArticleWhitepaper: Hyper-V Virtual Lab Tips and Tricks
Hyper-V Virtual lab Tips and Tricks While many backup administrators understand the importance of testing their backups, comprehensive testing can be elusive. Microsoft Hyper-V can help make lab...
View ArticleWhitepaper: Controlling APTs Using the Next-Generation Firewall
Controlling Advanced Persistent Threats Using the Next-Generation Firewall This paper first describes the current threat landscape and then introduces a model for enterprises to protect themselves...
View Article
More Pages to Explore .....