Where does “it” end? We can probably all agree that securing and protecting the devices that communicate with our networks is a fair definition of endpoint security. Similarly, these devices are one of the best places to start when figuring out how to secure your networks because they are a…
Read More
Part of fixing any IT issue is finding the right solution for the problem and ensuring the issue will not happen again. One of the major struggles for the IT industry is finding the right vendors to enlist as protectors. KuppingerCole’s Leadership Compass report on access management and federation aims…
Read More
Despite what you may have heard, security information and event management (SIEM) is not dead. Rather, it’s become an integral part of the latest advancement in security operations: the fusion center. We are seeing a paradigm shift in the space, and SIEM is no longer enough on its own to…
Read More
To avoid malware, you should always get hardware and software from official, authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads? In recent months, such bad code has appeared out of the box in mobile hardware and in reputable…
Read More