There’s a lot to be said for parents who draw immovable digital lines for their kids. Recently some moms made headlines doing just that then engineering the consequences when their kids stepped outside those lines. Here are just a few recent family tech and safety news headlines you need to know about. Bravo: ‘Ignore No More’ App […]

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just […]

I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]

In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

More and more companies are seeking the benefits of a hybrid cloud model. The ability to extend a private cloud to leverage the vast resources and services of the public cloud is rapidly becoming the Holy Grail of cloud computing. A key challenge has been securing the software-defined data center. Today, we announced several advancements […]