Blog

Combatting Spectre and Meltdown – Just Like 007

If you are a James Bond fan, you will likely remember that Spectre was an archenemy of 007, and in true Bond fashion, 007 successfully saved the world from the world-ending plot Spectre had planned. Therefore, it is quite fitting that Spectre and Meltdown are named for what are likely the worst and most pervasive…

Read More

The Dark Side of a DevOps Environment

Once considered cutting-edge, agile DevOps approach is now recognized by organizations seeking to deliver applications faster and with fewer operations issues. The industry results speak for themselves — a 2016 State of DevOps Report showed that organizations that adhere strongly to agile DevOps spend 29 percent more time on new work (e.g., new features and…

Read More

VMware and NSX: You Can’t Have Your Cake and Eat it Too, Part II

This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements related to it from VMworld 2017. It really is being set up to become VMware’s hallmark product over the next few years, and overall, VMware has done a very good job with…

Read More

VMware and NSX: You Can’t Have Your Cake and Eat It Too

This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully leverage the great functionality it can provide for complete network flexibility and security. Having just returned from VMworld 2017, I have to say that it was an eye opener from both…

Read More

Critical Infrastructures and Industry 4.0: The View Is Missing for the Whole

By Ibrahim Koese, Head of Technology & Consulting, CSPi Germany Recent cybersecurity events show that the readiness for large-scale attacks on critical infrastructures have grown dramatically. It can’t be ruled out that this is only a harbinger, or a “proof of concept” for larger attacks. A few years ago, only a few isolated attacks on…

Read More

Let’s Face It: You’re a Hack Just Waiting to Happen

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner year for the number of successful cyber breaches against US organizations. One notable takeaway: “If the number of breaches stays on pace with those reported in the first half of 2017, we’ll achieve…

Read More

Faster Data Breach Investigation Equals Faster Incident Response

Here we go, again.  The recent Petya ransomware attack caught the EU off-guard and created chaos that rippled through organizations wide and far.  Luckily, it was not as severe as Wannacry, but it reinforces that companies are still not prepared to quickly identify and take the necessary response to get a suspected cyber-attack under control….

Read More

A New Twist on Data Privacy Regulations – Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a breach of customer data. This is the topic that receives the most attention from the media, government and has the largest impact on a company’s bottom line.  However, there is another side of data…

Read More

The Role of a Channel Partner in Data Privacy Regulation Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their unique business needs.  Until now, the notion of data security was highly important but not viewed through the lens of meeting PII data privacy compliance requirements.  However, with the rise of conflicting US regulations between states…

Read More