Cloud Security March 8, 2017 Hybrid Cloud Adoption: The Logical Next Step Toward Innovation and Modernization 3 min read - Companies all over the world are beginning to recognize the potential of hybrid cloud to deliver opportunities for innovation and revenue growth.
Intelligence & Analytics March 7, 2017 From Linear to Orbital: Rethinking Defense in Depth 3 min read - Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
CISO March 2, 2017 Nine Security Tips That Go Outside the Box 3 min read - Even the most basic security measures can go a long way toward thwarting cybercrime. Use these simple yet effective security tips to protect your network.
Data Protection March 2, 2017 Prepared for the GDPR? Top 10 Findings From Hurwitz & Associates Survey 5 min read - A recent Hurwitz & Associates survey revealed that while general awareness about the GDPR is high, many companies are unprepared to meet the deadline.
February 28, 2017 Cloudflare Bug Creates Customer Data Leak Concerns 2 min read - Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
Data Protection February 28, 2017 How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability 4 min read - It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
February 28, 2017 Researchers Detect New Attacks Against MySQL Database 2 min read - Analysts found that MySQL databases had been attacked by a ransomware campaign similar to the one that affected MongoDB databases in January.
Risk Management February 23, 2017 The Best Defense Is a Good Offense: The Value of User Education 2 min read - User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
Data Protection February 21, 2017 Disposing of Your Device: Don’t Throw the Data Out With the Old PC 4 min read - Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
Data Protection February 6, 2017 Is it Time to Buy Cyber Insurance? 2 min read - To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.