Vidder Blog

Snowball EC2 + vSphere: 2nd Generation Hybrid Infrastructure

Secure Enclave: Zero Trust Network For The Cloud-based Enterprise

Security and the “All or Nothing” Paradox

MFA is too Important to be Moving Sideways

The CIO’s Inevitable Strategic Withdrawal

Secure Enclave: Foundation For The Cloud-based Enterprise

Securing Office 365 / SaaS

Segmentation: Where to Begin?

What Happens in Ukraine Doesn’t Stay in Ukraine

Protect Controlled Unclassified Information (CUI) From Cyberattacks

How to Build a Secure Enclave on AWS

Vidder Can Help You Protect Applications from Untrusted Users

Secure Enclaves: Public Clouds for Confidential Workloads

Russia’s Cyber War Testing Ground

Cloud, Digitalization and Advanced Attacks are Breaking the Old Stack

Predatory Malware is Rendering Massive Security Investments Irrelevant

The Writing is on the Firewall: VMware and Verizon Intro App Security as a Service

The Big Shift to Software-Defined IT is Now Underway

Security Process Creep and the Security Paradox at an F100 Enterprise

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Security as a Brand Strategy in the New Cyber World

We are now at War… Cyber War

Vidder Trust Assessment Highlight Tracker

Verizon's Operation Convergent Response

With So Many Threats, What Should Enterprises Do To Reduce Cyber Risk?

Game of Threats

New Cyber Attacks Require New Counter-Measures

What is the Difference Between NAC (Network Access Control) and Trusted Access Control?

The Cloud is about to Crush the Hardware-based Security Industry

Recent ESG Research Suggests Need for Access Control Transformation

Goodbye NAC | Hello Vidder!

SDP Is The New NAC

A Flicker Of Light: A New Security Stack Points The Path To Safety

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

Software Defined Perimeter: The Secret Service of TCP/IP Networks

Winning A Battle Yet Losing The War

Stop Catastrophic Cyber Failure: The Value of a Threat-based Security Strategy

Stop Catastrophic Cyber Failure: Step #2-- Align Security Controls to Reduce Risk

Mea Culpa: Time To Build Security Into Connectivity

The Rental IT Trend

Defending Against the APT Paradigm

Control the Flow for Security

Stop Catastrophic Cyber Failure: Step #1— Do It Yourself Cyber Threat Assessment

Stop Catastrophic Cyber Failure: Why a Threat-Based Security Model Is the Best Approach

Vidder 2016 Predictions: Fixing Virtual Silos and Securing the New Virtual IT

A Brave, New Cybersecurity World: Evaluating Trust Before Allowing Connectivity

Reinventing the Handshake

From TMC Newsroom: Vidder CTO Discussed Building the Two Pillars of a More Secure Enterprise

The Incredible Shrinking Perimeter

Security: Complexity is NOT the answer

Former CIA CTO and Vidder Founder Examined Catastrophic Cyber Failures at West Point US Military Academy

3 Trends From Black Hat and Def Con

About Vidder

Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.

Subscribe to Email Updates

Recent Posts