Video Screencast Help


Search results

We can blame networking. IT security was never simple, even when computers were largely stand-alone machines connected to banks of green-screened terminals. However interfaces between systems were generally inaccessible to all but operations staff. ...
Blog Entry by nicolas_popp | 24 Apr 2012 | 0 comments
  In the same way, the cloud emerged from software virtualization, cloud security can only emerge from the process of virtualizing security itself. As virtualization separated software from hardware, allowing enterprise software to freely move ...
Blog Entry by nicolas_popp | 05 Feb 2012 | 0 comments