Risk Management That Embraces Privacy Can Strengthen Security


It is hard to imagine a world in which we didn’t use the Internet at work. 15 years ago, it was a luxury. Today, Internet use at work is mission-critical. We’ve evolved from casually getting online to search for basic information about a company to doing such critical things as accessing webmail, posting to and [...]

Watch: The Palo Alto Networks-VMware NSX Integration Explained

Watch: The Palo Alto Networks-VMware NSX Integration Explained

In this latest of our lightboard sessions, Warby Warburton shows how the seamless integration between VMware NSX and our VM-Series virtualized Next-Generation Firewalls allows you to automate security provisioning, inclusive of firewall services and associated security policies, as a means of segmenting your virtual machines using Zero Trust principles. Watch below to better understand next-generation [...]

The Cybersecurity Canon: Read Rick Howard’s First-Look Review of SPAM Nation by Brian Krebs

The Cybersecurity Canon: Read Rick Howard’s First-Look Review of SPAM Nation by Brian Krebs

The Cybersecurity Canon is official, and you can now see our website here. We modeled it after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have 20 books on the initial candidate list but we are soliciting help from the cybersecurity community to increase the number to be much more than [...]