The walk-up music for the post-lunch keynote speaker sounded familiar, but it took me a minute before I figured it out: It was the Hot Dog Song from Disney Jr.’s Mickey Mouse Clubhouse. It may have been the most unique walk-up music I heard at any of the cybersecurity conferences…
Read More
As cloud infrastructures become widely adopted across many organizations, some are also moving their software projects to the cloud — specifically containerized environments. While this move brings agility and scale with it, a false assumption can also arise: “My applications are inside containers, so they are secure.” In reality, however,…
Read More
The need to achieve responsible enterprise security has taken center stage in enterprise IT management in recent years, precipitated by a deluge of public data breaches that damaged company reputations. However, lacking information on the most critical modern attack vectors, many organizations continue to rely solely on traditional virus scanning…
Read More
The new year has arrived, and with glasses raised and timeless stories recounted, we can now look to that well-meaning but often short-lived practice we know too well: setting resolutions. Industry leaders often make fulsome commitments to changing systems for the better, fully intending to carry through, but they may…
Read More