UPDATED: Everything you need to know about Veritas

Everything you need to know about Veritas

As of October 3rd 2015, Veritas has once again become an independent company. If you use Veritas products, stop searching, we have all the info you need to know.

[Read more…]

A password break up letter all CIOs need to write

A password break up letter all CIOs need to write

Dear passwords, we need to talk.

This letter has been a long time coming, and it can’t wait anymore. I don’t really know where to begin, so I am just going to cut to the chase. I’m breaking up with you. It’s over. We are done-zo. Finito. Ancient history. Here’s why.
[Read more…]

It’s time we re-examine virtual security practices

It's time we re-examine virtual security practices

We’ve been hearing about the potential benefits of using a security solution designed specifically for virtual environments for a few years.

Unfortunately, many infosec departments continue to protect virtual environments with traditional, or legacy, approaches. While this is certainly a step in the right direction, something many see as “good enough,” the fact is traditional security doesn’t cut it, and exposes you to risk. To put a finer point on it, not adopting VM-focused solutions has the added impact of taking away those hard earned efficiency gains, promised by a virtual environment.

With more data centers in the cloud than ever, waiting around to address this problem is no longer feasible. Just look at what happened with the VENOM exploit — a vulnerability that put millions of virtual machines at risk — and you’ll see that hackers have started to attack these ubiquitous virtual machines in sophisticated new ways.

Now that virtualization has become the norm  it’s time we re-examined the need for better, virtual-specific modes of keeping your servers safe and secure.

[Read more…]