Network SecuritySecuring the enterprise with the five W’s of accessKurt RoemerDecember 18, 2014Burden of proof should grow heavier as request for access grows more sensitive.
Security ArchitectureMaking peace with the cloud and BYODKurt RoemerAugust 15, 2012If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.