Modern Web Application Security for “Cloud First” Initiatives

The richness of Web Access Management (WAM) is critical to your organization because it’s often the hub of access for customers, employees, third parties and more. And so is your “Cloud First” strategy. Single sign-on is expected, but achieving this while securing access to your applications in a Cloud-Hybrid word is fraught with risks and […]

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development  […]

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi, Vice President of Strategic Research at Axiomatics dives into the trends and challenges for data security in 2019. Read the article in its entirety here. Predictions for the new year: […]

VMBlog Feature: 2018 Predictions, What’s to come in Enterprise Security

What’s to come in Enterprise Security by Gerry Gebel Every year enterprise security is evolving to deal with newer, more sophisticated security threats. In 2017, we saw many organizations adopt big data technologies, begin to move toward a microservices approach to break down large applications and work toward scalable compliance with new and changing regulations. […]

DZone Feature | Cybersecurity: The Do’s and Don’ts

In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. By Gerry Gebel | Security Zone · Opinion Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become […]

CSO Online Feature: Managing DevOps with Dynamic Authorization

Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself. by Gerry Gebel In today’s on-demand and fast-changing global economy, consumers expect companies to deliver and update products and services rapidly. Many organizations have turned to a devops methodology to […]

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats are becoming more prolific and more sophisticated than ever before. Cybersecurity is no longer about prevention, but rather about detection and readiness for the inevitable. And everyone, from boardroom to […]