Daniel Petrillo

Busting Cloud Security Myths

Although far from new in technological terms, the ubiquity of public and hybrid cloud use is a relatively recent phenomenon.…

3 days ago

How Hackers Compromise Virtual Desktop Infrastructure

How do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI)…

2 weeks ago

Here’s What’s Driving the Rise In Cloud Workload Cyber Threats

Available anytime and capable of being run from anywhere, cloud computing provides a perfect solution to operational challenges posed by…

1 month ago

Virtual Desktop Infrastructure: Crucial in a Work-From-Home World

The coronavirus pandemic has forced companies to experiment with remote work in ways they never had before. For many, working…

2 months ago

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

The recent leap towards cloud computing has fast-forwarded digital transformation for countless organizations. What there hasn’t been, however, is a…

2 months ago

Cloud Workloads: How Does Shared Responsibility Affect Security?

Cloud migration continues at a brisk pace. As many as 94% of enterprises now use the cloud, and data suggests…

3 months ago

3 Tips for Better Virtual Desktop Infrastructure Security

The recent rise in remote working has up-ended the corporate IT landscape. In a matter of days, remote working went…

4 months ago

Advanced Endpoint Protection in the New COVID-19 World

The term “new normal” means different things to different people. For some, the term is synonymous with a return to…

6 months ago

Advanced Endpoint Security in the New COVID-19 World

The term “new normal” means different things to different people. For some, the term is synonymous with a return to…

6 months ago

How Emerging Cyber Threats Outwit Existing Endpoint Security

In the ongoing war over cybersecurity, endpoints seemed like settled territory. After years of surrounding these vulnerable vectors with defensive…

7 months ago