Monday, August 29th, 2016

July 2016 – In a briefing with eNova CEO and founding engineer Robert Wann, we had a chance to hear about their new XWall MX+ disk controller. eNova, which has been in the disk controller business for over 16 years in the Asia market. The new MX+ is the latest generation of their fully integrated [...]

At this year’s Black Hat I had the opportunity to sit with Raimund Genes, CTO of Trend Micro. Mr. Genes has been a driving force in Trend’s growth as an innovator in the Information Security Space for several decades. As CTO he is responsible for introducing new methods to detect and eradicate threats, and to [...]

August 2016, Security is the primary focus of Black Hat and one of the many briefings that happened focused on the mobile threat landscape and explored how the operating system (OS) being looked at affects greatly the type of vulnerabilities that are to be expected. With the growing popularity of bring your own device (BYOD) [...]

April 2016 – As a shift in the rollout date this year, Verizon released their annual Data Breach Incident Report (DBIR) at briefings at NAB in Las Vegas, and then general release shortly following the show. The NAB show covers the broadcast and content creation industries and has recently shifted from analog based workflows to [...]

March 2016 – The ongoing success of the private sector relies in large measure on its ability to commercialize innovative research and intellectual property, business transactions, and financial data. Failing to secure this vital digital information, and the systems that hold it, inevitably leads to lost market share, fewer customers and corporate breakdown for the [...]

March 2016 – In the structuring of a security solution for an enterprise, reporting and documentation hold important roles as support for technology solutions. The reporting and operating procedures help designate the liability and cost of remediation in the event of a security incident. Prior to placing systems online, senior management should review privacy and [...]

March 2016 – A topic of discussion at the San Francisco RSA Conference this year was the System Development Life Cycle (SDLC) and issues related to it with the integration of security. Attackers leverage weaknesses in all platforms to pivot across the enterprise. System administrators and managers need solutions that allow them to monitor applications [...]

Inviting people into your business is a well known process. In big businesses with big offices they’ll have a visitor management system at the front door. You get a nametag when you walk in. Folks who are there more frequently may have badges or keys. In today’s connected world it’s not only people in your [...]

January 2016 – This year, the RSA Conference San Francisco returns to its traditional time slot of February. This year’s event has been updated to reflect not only the issues of the current business environment, but to make the take-away from the event more actionable on a short term basis. In the past, while the [...]

October 2015 – At the Virtualize conference, organized by graphics analyst firm Jon Peddie Research, the discussion focused on the shift in requirements and architecture of the new generation of virtualized networks. Typically, VMs are used in an enterprise for standard office and transactional processing applications. The newest generation of GPUs and GPU based appliances [...]