Posts From CCME

The data backup market is changing fast. Here are five vendors leading the transformation. The backup and recovery market has become a crowded space, with hundreds of vendors vying for market share. At the higher end of the market, the

As Ron Kehoe wrapped up his Data Center World session about Network Security Policy Management (NSPM) this past Wednesday, an attendee, sounding as though he had just learned about the Holy Grail of security, asked: “And, this technology is available

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the authorization to tweak the cloud provider’s pre-packaged stack.

Databases – by definition – contain data, and data such as credit card information is valuable to criminals. That means databases are an attractive target to hackers, and it’s why database security is vitally important. In this article we cover

Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*. This is the first direct competitive analysis of endpoint detection and response (EDR) vendors. The report provides an assessment of

Historically the Internet of Things (IoT) has been much more hype than substance. Sure, there have been a few verticals such as oil and gas and mining that have embraced the trend, but those vertical have been active in IoT

If you’re trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National Institute of Standards and Technology thinks you should try — and the agency wants to help you implement it in

DDoS are growing. Designed to take down a website or network infrastructure, they can be volumed based, where a service is swarmed with requests, or protocol request based, which use TCP/IP requests from false IP addresses to wear down resources.