Security is as much about choices as it is about policies. Which software solution you pick is as important as...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention...
At the end of 2007 I wrote a column on the future of security in 2008 in Security: What will...
At a recent IT Roadmap show -- a travelling road show that brings Network World columnists "to life" -- I...
Whom can you trust? In security, many of us nurture a healthy sense of paranoia and tend to be distrustful....
Whether you believe we are in or about to enter a recession, IT budgets are certainly tightening up for 2009....
I was visiting Greece last week to spend some time with my family. I'm always amazed at the tenacity and...
There's IT, and then there's shadow IT.Shadow IT is all the IT that was neither planned nor approved by anyone...
Enterprises are increasingly interested in cloud computing as a potential solution to capacity challenges. The idea is that if you...
I have been very interested in virtualization security since early 2004 and it now seems like it has become a...