Video Screencast Help

Search

Search results

We can blame networking. IT security was never simple, even when computers were largely stand-alone machines connected to banks of green-screened terminals. However interfaces between systems were generally inaccessible to all but operations staff. ...
Blog Entry by nicolas_popp | 24 Apr 2012 | 0 comments
    In the same way, the cloud emerged from software virtualization, cloud security can only emerge from the process of virtualizing security itself. As virtualization separated software from hardware, allowing enterprise software to freely ...
Blog Entry by nicolas_popp | 05 Feb 2012 | 0 comments