By Kevin Vogl
I was one of 23,000+ attendees at VMworld last week in Las Vegas, NV. This is my 12th time attending and it was as hectic as usual, and had fewer announcements of new products than in past years. However, VMware focused on three
By Jack Bornhoft
Is your virtual data footprint growing rapidly—or are you expecting to have a growth spurt in the near future? Then it’s time to think about scale. Now, scaling compute is relatively friction-free, but scaling storage on the other hand can be a challenge.
Clint Wyckoff, Veeam’s Microsoft Cloud & Datacenter MVP, reveals how Veeam can enhance your cloud strategy
At Champion / MessageOps, we’re a big advocate of Veeam, a software provider dedicated to helping organizations meet recovery time and point objectives (RTPO™). We sat down with Clint Wyckoff,
The world of PCI compliance is a daunting one for those of us in the industry. The litany of regulatory concerns that affects how we handle both our internal and external customers complicates and adds further considerations to IT infrastructure projects as well as any
When every employee has a company’s information in their pocket or purse, every misplaced smartphone represents a risk for small and medium businesses. Security products vendor Kensington recently disclosed that each year, 70 million smartphones are lost. Only 7% are ever recovered. 4.3% of company-issued
Due to the current state of information security, organizations are being asked to strengthen their incident response and security monitoring capabilities. Since Cybersecurity threats expose financial institutions to operational, reputation, and financial risks, regulators have increased their expectations for organizations to implement, enhance, and adapt
Information Security policies are the foundation of a strong information security program. Organizations must implement policies to manage and safeguard the protection of information and the systems that access, gather, share, store, process, and transmit information.
It is important to keep in mind that information security
While solutions are being developed to support critical infrastructures to be more efficient, cyber-criminal organizations are continuously exploring new ways to exploit vulnerabilities in systems and applications. The biggest challenge that information security professionals face today is their inability to keep up with such demand
The need for safeguarding information systems that use, transmit, collect, process, store, and share sensitive information has become a high priority. From the federal government to the private sector, the goal is to design and deploy secure systems to avoid potential events that may impact
In the past few years, there has been an alarming increase in the number of security breaches and the number of records compromised. 2014 was named the year of security breaches in retail and financial institutions. 2015 has been referred to as the year of
Due to the increasing number of security breaches in the last few years, cybersecurity has become a persistent business risk. As companies evolve from security to cybersecurity risk management, information security professionals often struggle with identifying and prioritizing cybersecurity-related risks. According to information security experts,
Since the first trace of ransomware was found in 2005, different malware variants have proliferated, quadrupling between 2015 and Q1 of 2016. Ransomware has become the most challenging cyber threat today. Attackers are also growing more sophisticated on deploying the malware and encrypting files once