Last week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status…
Read MoreResearch
Right Size Security – Episode 2: Building a Security Program for the CSO
In this episode of Right Size Security, analysts Steve Ginsberg and Simon Gibson discuss building a security program at the CSO…
Listen NowRight Size Security – Episode 1: Building a Security Program for the CIO
In this episode of Right Size Security, analysts Steve Ginsberg and Simon Gibson discuss building a security program at the CIO…
Listen NowVoices in Cloud – Episode 4: A Conversation with Bernard Golden of Capitol One
In this episode of Voices in Cloud, host David Linthicum speaks with Bernard Golden about pioneering cloud computing industries and how…
Listen NowEnterprise-Level Mobile and IoT Security
Mobile devices have become ubiquitous within the enterprise over the last decade moving from shadow implementations to mainstream for extended communications,…
Read MoreHow IBM is Rethinking its Data Protection Line-Up
Following up on my take on the evolution of product and strategy of companies like Cohesity and NetApp, today I’d like…
Read MoreThe New Ecosystem of Identity Access Management
The saying goes, “Identity is the new security perimeter.” This changes the traditional way we think about granting users access to…
Read MoreFrom Data Protection to Data Management and Beyond
Just three weeks into 2019, Veeam announced a $500M funding round. The company is privately held, profitable and with a pretty…
Read MorePhishing Prevention and Detection
Information security touches every aspect of our digital lives in unpredictable and often unintuitive ways. We are all expert in understanding…
Read MoreCIO Report: Enterprise Data Protection
The enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises…
Read More