DataSecurity1

5 Data security tips every IT manager should know

The past few months have been full of news coverage around data breaches and the need for data awareness. From hospitals to universities to children’s toys, data attacks are coming full force, and IT pros …

3 Questions answered by the Verizon Data Breach Report

Verizon’s annual Data Breach Investigations Report has become a hallmark of the security industry’s progress, as well as its preparedness against attackers and breach incidents. This year’s theme is, “Security should be a driving force, …

theproblem

Great product teams play bingo, not basketball

I totally admit that I drive product folks crazy. I am a huge believer that it is the responsibility of every person in a company to help ensure complexity and gratuitous innovation don’t creep into …

Events

Next on the schedule: Nutanix .NEXT

As our company evolves, our focus remains the same: helping customers become data-aware, and improve the way they manage, secure, protect, and gain actionable info from data, no matter where it lives. With this in …

3 Days, 3 Talks, 3 Conferences, and 3 Reports

I’ve been on the road speaking at various conferences over the last two weeks. This past week, however, I found myself with a very busy schedule that included flights to both Boston, MA and Washington, D.C. (and back …

Small conferences and big ideas

This past weekend I had the pleasure of presenting at two different conferences in two different cities on Bootstrapping a Security Research Project. Both conferences were small when compared to large vendor-backed events like Black …

SANS THIR and BSides NOLA recap

This past week I had the pleasure of heading to New Orleans, LA to speak at two exciting conferences: The SANS Threat Hunting and Incident Response Summit and Security BSides NOLA. SANS Threat Hunting and Incident …

Andrew Hay to moderate a panel at the RSA Conference

Do you know many Internet of Things devices are currently connected to your company’s network? More importantly, do you know if any of those devices contain vulnerabilities that could leave your sensitive data exposed to …