Preparing Your Storage Environment for Tomorrow’s Opportunities

Businesses today can’t exist without data. They feed on it, breathe it, and those that understand how to most effectively […]

Full Details

A breach is found. Now whom do I tell?

In 2014, the Identity Theft Resource Center (ITRC) tracked 783 data breaches with 85,611,528 confirmed records exposed. This year appears even more […]

Full Details

An elegy for privacy

In childhood I dreamed of a world quite grand Where my name and face were far from mystery A life […]

Full Details

The case for consistency in security

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

Full Details

Star Trek Biofilters and Terahertz Ray Technology

The biofilters from Star Trek may some day become reality.  The Star Trek biofilter is a device that scans for […]

Full Details

Virtualization for Competitive Advantage | Cleveland State University

I will be joining Pei-Ying Lin at Cleveland State University today to present on Virtualization for Competitive Advantage.  Virtualization can […]

Full Details

Interviewing Tips from Microsoft

In a 2008 blog entry by Steve Clayton at Microsoft, he mentions the five things he looks for in candidates when […]

Full Details