Blog

VMware and NSX: You Can’t Have Your Cake and Eat it Too, Part II

This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements related to it from VMworld 2017. It really is being set up to become VMware’s hallmark product over the next few years, and overall, VMware has done a very good job with…

Read More

VMware and NSX: You Can’t Have Your Cake and Eat It Too

This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully leverage the great functionality it can provide for complete network flexibility and security. Having just returned from VMworld 2017, I have to say that it was an eye opener from both…

Read More

Critical Infrastructures and Industry 4.0: The View Is Missing for the Whole

By Ibrahim Koese, Head of Technology & Consulting, CSPi Germany Recent cybersecurity events show that the readiness for large-scale attacks on critical infrastructures have grown dramatically. It can’t be ruled out that this is only a harbinger, or a “proof of concept” for larger attacks. A few years ago, only a few isolated attacks on…

Read More

Let’s Face It: You’re a Hack Just Waiting to Happen

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner year for the number of successful cyber breaches against US organizations. One notable takeaway: “If the number of breaches stays on pace with those reported in the first half of 2017, we’ll achieve…

Read More

Faster Data Breach Investigation Equals Faster Incident Response

Here we go, again.  The recent Petya ransomware attack caught the EU off-guard and created chaos that rippled through organizations wide and far.  Luckily, it was not as severe as Wannacry, but it reinforces that companies are still not prepared to quickly identify and take the necessary response to get a suspected cyber-attack under control….

Read More

A New Twist on Data Privacy Regulations – Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a breach of customer data. This is the topic that receives the most attention from the media, government and has the largest impact on a company’s bottom line.  However, there is another side of data…

Read More

The Role of a Channel Partner in Data Privacy Regulation Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their unique business needs.  Until now, the notion of data security was highly important but not viewed through the lens of meeting PII data privacy compliance requirements.  However, with the rise of conflicting US regulations between states…

Read More

Malware detection is simple, right?

  Wrong.  Day after day millions of computers are attacked by malware. As the number of malicious software attacks has been growing over years, the types of malware detection and antivirus solutions also grow. Yet, the attackers have the upperhand as there is no protection against zero-day attacks, or something which has just been invented….

Read More

Reap the benefits of IoT without Compromising SCADA security

Industry 4.0 is the term used to describe the fourth industrial revolution, which is the future of industrial production based on the “Internet of Things” (IoT).  As with all major transitions this leads to exciting opportunities, but also great challenges. The good news is that IoT is expected to offer advanced connectivity of devices, systems,…

Read More

Whitepaper: Rapid Breach Detection & Investigative Solution for Meeting PII Compliance Deadlines
Download Now