article thumbnail

World Backup Day is heading our way

Network World

World Backup Day is March 31 a day that has been recognized every year since it was first set up in 2011. Components of a data security plan Many strategies have been developed over the years to complement and extend the importance of data backup. Are you ready? Businesses need to stay up and running, no matter what.

Backup 396
article thumbnail

Former VMware exec Gillis resurfaces to run Cisco security business (again)

Network World

Industry veteran Tom Gillis, who left VMware in December, has returned to Cisco in a new but familiar role: senior vice president and general manager of Cisco’s Security Business Group. After that, Gillis founded cloud computing firm Bracket Computing, which was acquired by VMware in May 2018.

Vmware 468
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data center provider fakes Tier 4 data center certificate to bag $11M SEC deal

CIO Business Intelligence

Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements after allegedly falsifying a Tier 4 data center certification to secure a $10.7 million contract with the US Securities and Exchange Commission (SEC). Queries to AiNET, however, did not elicit any response.

article thumbnail

Let’s talk about security culture!

Forrester IT

I am thrilled to introduce my most recent report, ‘Instill a Security Culture by Elevating Communication’. This is an update of my 2011 report “How To Market Security To Gain Influence And Secure Budget’. A different time called for a completely revamped report (read on to see what’s changed).

Security 271
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.

Security 278
article thumbnail

Reference to Cyber Security “Wake-Up Calls”

CTOvision

We have previously discussed research and analysis we did for the Cyber Conflict Studies Association on the many “Wake-Up Calls” the nation’s policy makers have declared themselves to have had regarding cyber security. If history is any predictor of the past, we will still be getting these wake-up calls long into the future.

Security 252
article thumbnail

Have we nailed it? Or do we still need to talk about security communications?

Forrester IT

In 2011, I published a report on “How To Market Security To Gain Influence And Secure Budget”. I am now going through the process of refreshing this report, and it got me thinking: 1. What has changed in this space of security communications and influence since 2011?

Security 170