“How many visitors do you expect to access the No More Ransom Portal?” This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, McAfee) portal going live, which I didn’t have a clue how to answer. What do YOU think? How many people ...
Read Blog
Blog post written by Peter Bury. There is a lot of emphasis and excitement around the growth and versatility of public clouds, overshadowing the strong growth and development of private clouds. A private cloud is not just a virtualized infrastructure of compute and storage services. It is an automated and orchestrated system of virtualized compute, ...
Read Blog
This blog post was written by Sandy Orlando. As a Sci-Fi fan, the journey to the cloud reminds me of the USS Enterprise in Star Trek whose mission was to explore new worlds—to boldly go where no one has gone before. As businesses rush head-on into the digital frontier, spinning up new cloud instances at ...
Read Blog
This blog was written by Carric Dooley. Ask your colleagues whether cloud security is the same as or different from traditional data center security; some will say it’s the same, while others will say it’s different. The correct answer, of course, is “yes.” There are probably as many similarities as there are differences between cloud ...
Read Blog
17% of enterprises have 1000+ virtual machines on public cloud and 28% of enterprises have 100-1000 virtual machines on public cloud[i]. As per Verizon’s 2016 Data Breach Investigations Report, server workloads are amongst the prime targets for cyber criminals. If we correlate these two facts, then we realize the importance of having a strong security strategy for cloud ...
Read Blog
This blog was written by Brian Dye. With enterprises moving to hybrid cloud environments, IT architectures are increasingly spread among on-premises infrastructure and public and private cloud platforms. Hybrid models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the enterprise. And this added complexity requires an increasingly ...
Read Blog
Would you hand your house keys to a total stranger and then go away on vacation for two weeks? Probably not, but that’s precisely what some businesses do when they move applications and data to the public cloud. Security has long been the principal fear that weighs on cloud investments. While perceptions are improving, McAfee’s ...
Read Blog
Cloud environments have made some things much easier for development teams and IT organizations. Self-service portals have cut down the amount of “hands on” intervention to spin up new environments for new products. Provisioning of new infrastructure has moved from weeks or days to minutes. One thing that barely changed with this transformation is security. ...
Read Blog