Business

Equifax data breach

Attackers Hit the Identity Theft Jackpot with Equifax Breach

All data breaches are bad data breaches, but the Equifax data breach is particularly disastrous due to the volume and sensitivity of the data the attackers were able to access. When it comes to data breaches, the Equifax attackers hit

Attackers Hit the Identity Theft Jackpot with Equifax Breach Read More »

machine learning

Three Critical Machine Learning Questions for Cybersecurity Pros

For cybersecurity pros who fight unseen cloud adversaries every day, the rise of faceless security automation might feel uncomfortably familiar. But is automation yet another shapeless enemy, this time intent on slashing cybersecurity jobs? Or is it something else? Fortunately,

Three Critical Machine Learning Questions for Cybersecurity Pros Read More »

Lenovo ThinkAgile VX Series

Lenovo’s New VX Series – Charting a Course to VMware-Based Hybrid Cloud

Virtualization is the common thread connecting cloud computing, hybrid cloud, integrated systems and hyperconverged appliances. From its first appearance in the late 1960s (in IBM’s S/360 mainframes) to massive deployments of commoditized servers today, virtualization addressed a still-common problem—the wide

Lenovo’s New VX Series – Charting a Course to VMware-Based Hybrid Cloud Read More »

CloudPassage DevOps security

From Waterfall to DevOps to DevSecOps & Continuous Security

It all started with the Waterfall model of software development. The development process was pre-planned, set in stone, with a phase for every step, everything was predictably… slow. Each organization involved in building a web application was siloed, and had

From Waterfall to DevOps to DevSecOps & Continuous Security Read More »

Scroll to Top