12/1/2014

The New Security Lockdown Guide

The proliferation of cloud services, mobile devices and Big Data presents a radically altered attack surface for customer IT assets. The Black Hats have adapted. Have you?


In-Depth

2014 Security Review: The Year in Breaches, Hacks and Exploits

By Chris Paoli

Some of the security incidents that dominated headlines in 2014 were predictable. Others came as a complete surprise.


How Cloud Partners Can Identify (and Plug) Datacenter Security Holes

By Gladys Rama

Most of the top cloud vendors provide basic datacenter security controls, but for partners looking to launch cloud-based services with third-party vendors, "basic" isn't enough. Where are the security holes in a cloud datacenter, and how can partners fill in those gaps for their customers?


Security Lockdown Guide: How To Fight the Next Generation of Black Hats

By Scott Bekker

The proliferation of cloud services, mobile devices and Big Data presents a radically altered attack surface for customer IT assets. The Black Hats have adapted. Have you?