Recent Posts

Video: There is no time for security (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “There’s less and less separation between building out the application and building out the infrastructure. Security has to be built in. It has to be automated. It’s no longer something we deploy…

Read More

Will we be able to control data in the wild? (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “Once the data is out there, it’s out of their control,” said Elliot Lewis (@elliotdlewis), VP of security, risk, and compliance research at Info-Tech Research Group, in our conversation at the Black…

Read More

Distribute, virtualize, and then what?

Guest post by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC.  Two design methods that always seem to improve any computing system architecture are distribution and virtualization. Almost no one disputes their…

Read More

Video: Cloud forces us to work smarter, not harder

Guest blog by David Spark, Spark Media Solutions “I love this old adage that if you’re a little behind you work harder and if you’re much further behind you have to work smarter. The crucible of the hyperscale of cloud…

Read More

How microsegmentation helps with applications

Guest post by Matthew Pascucci, Frontline Sentinel One use case for microsegmentation that we haven’t completely touched on in previous posts is the protection of applications within your network. We’ve discussed the use of security as a whole and why…

Read More