How Virtual Machine Tech Keeps Pace With Security Threats

The roots of virtual machine (VM) technology go back 50 years, and for most of that time, VMs were the exclusive domain of mainframe computing. …

Larry Hughes

How to Cure Security Alert Fatigue, and Still Protect your Cloud Infrastructure

The results of a recent survey published by the Cloud Security Alliance reveal that security professionals often feel deluged by alerts and …

Larry Hughes

Making the IoT Secure in an Increasingly Connected World

A series of cyberattacks that made headlines last month for both their massive size and fast execution were both stunning and completely …

Larry Hughes

Cloud Security: “How,” Not “If”

IT concerns about cloud security are receding as organizations move into the cloud and deploy various cloud scenarios as an integral part of …

Larry Hughes

Cloud Security Control Takes Secure Interconnection

Cyber-security continues to be the top concern for enterprises migrating applications to the cloud, with a recent IDG Cloud Computing study …

Larry Hughes

De-Perimeterization – Staying Secure in the Face of Growing Attack Surfaces

My kids recently decided to pare down their rather large Lego collection. Actually, it would be more accurate to say their rather large Lego brick…

Larry Hughes

Consider This: The Cloud Isn’t Risk-Free, but It Can Be Secure

I was recently asked by the Cloud Security Alliance (CSA) to write a thought leadership white paper titled "Security Considerations for Private …

Larry Hughes

There’s no Crying in Baseball, or Cloud Security

Cybersecurity is topping the roster as one of the biggest business concerns for enterprises, with a batting average of 117,339 security incidents …

Larry Hughes