-
virtual servers introduce real attack vectorsYou know about zombies. No, not zombie computers, but the previously human, undead, flesh-eating kind. When the zombies are out, people invariably run into...
-
Two-factor authentication is cool again!The tried-and-true hardware token has a few drawbacks, such as the need to deploy and periodically replace it and the minor inconvenience of having to carr...
-
Private cloud, security and a change of philosophyWhen organizations take the decision to move to a private cloud computing infrastructure, one of their core concerns is usually security....