fortune_small.png

“Many companies are asking for machine learning tools to solve problems—even if they don’t have a clear idea of what these tools can do.”

CIO_small.jpeg

“We're not on the brink of democracy's digital implosion, but we have a lot of work left to do. In any case, it's about much more than just the voting machines.”

usatoday_small.jpg

“This deepens concerns about consumer trust in the Yahoo brand -- two massive breaches of trust back-to-back would cause stir in the inner circle of any acquisition team.”

  • The rise and risk of IoT in healthcare

  • “Above the trend line” – Your industry rumor central for 9/18/2017

  • What you need to know before investing in containers

  • Want to Elevate Your Managed Security Service Offerings? Create a Guidebook with These 10 Elements

  • Follow VMblog.com: CloudPassage Partners with Sumo Logic to Deliver Closed-Loop Security Analytics

  • The best (and worst) features of 7 top cloud security solutions

  • VMware cloud services evolve with AppDefense security tool

  • How can developers and security professionals work together?

  • Survey finds U.S. universities still struggling to provide cybersecurity education

  • Universities struggle to provide cybersecurity education: Infographic

Media Contact

Meghan Matheny, Blast Media
Phone: 317-806-1900 ext.115
Email: meghan_matheny@blastmedia.com
blastmedia.com

From our Blog

  • Leveraging LIDS – logs and lots more

    When it comes to a Log-Based Intrusion Detection System (or LIDS), there’s a lot you can leverage. LIDS is a useful cross-platform, tactical, and supplemental (if you have an existing SIEM) pattern matching system. You can use LIDS to set…