Chris Wysopal

Assessment Guidelines to Securing an Enterprise

Secure Infrastructure:Employ Perimeter Security Do not allow any external Internet connections to terminate on any internal machines. DMZs must be used. This also goes for connections from partner networks. All Internet...

Latest Posts

Fractal Analytics CEO Pranay Agrawal on Trends in AI

I spoke with Pranay Agrawal, CEO and Co-Founder at Fractal Analytics, about what’s driving the AI sector, and how companies can best strategize to...

Execs from Nvidia and Equinix on Scaling AI

I spoke with executives from Nvidia and Equinix about the challenges involved with deploying AI at scale; we also discussed the optimal architecture for...

Citrix vs. VMware: VDI/DaaS Comparison 2022

Citrix and VMware have been among the leading VDI pioneers and are now competing head-to-head in a related market, DaaS. Both vendors are well...

Cloud Earnings Results: Best of Times – or Worst?

Recently, the Big Three of cloud computing – Amazon, Microsoft, and Google, also known as AMG – announced their quarterly results. Their quarter could...

Avaya’s Karen Hardy on AI, Cloud, and Customer Experience

The pandemic has permanently changed the way people work, as well as the role that communication and collaboration technology plays in our lives. Clearly,...