Category

Cloud Computing
Written by Chris Peterson, Forbes According to a 2019 survey from The Conference Board of more than 800 international CEOs and 600 C-suite members, cybersecurity is cited as the top external concern. The Conference Board also notes (via CIO Dive) that malicious cyber activity cost the economy up to $109 billion in 2016. CEOs and boards that seek...
Read More
https://www.cisomag.com/6-practices-to-strengthen-your-password-hygiene-in-2020/ By Rudra Srinivas The National Cyber Security Centre (NCSC) of the United Kingdom recently issued a warning to its citizens to have stronger and unique passwords after releasing a file that contained the top 100,000 commonly hacked passwords from the “Have I Been Pwned” data set. With unprotected databases and online services getting breached often, leaked/stolen passwords from...
Read More
The importance of establishing strong cybersecurity systems within small to mid-sized companies increases every day. 60% of small businesses who are the victim of a cyber attack close their doors within six months. The U.S. Small Business Administration claims over 1/3rd of all cyber crimes target small to medium sized businesses. Those statistics have continued...
Read More
VPN
What is a VPN? Every time you access a website while browsing the internet your data must first go through your Internet Service Provider (ISP). They can log and track that data while seeing everything you do online. Some of these companies even sell that information to governments, advertisers, or other third parties.  A Virtual...
Read More
Deep learning is a term that you are most likely hearing often. We have entered into an advanced age of technology and there are a lot of questions circulating around this subject. What is deep learning? Is it artificial intelligence? When will we see more evidence of AI integrated into our lives? The answer is,...
Read More
Written by: Teju ShyamsundarSenior Product Marketing Manager at Okta The current state of device based access control It’s no secret that devices have changed the way we work. Mobility has transformed the enterprise enough to redefine the term “mobile device.” With modern management techniques for mobile form factors as well as laptops and tablets, the...
Read More
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
Written by: Michael Busselen of Crowdstrike The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,”includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends...
Read More
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for...
Read More
Written By: Jen Toscano As enterprises embrace digital transformation, they must find a new way to manage networking and security. Many are turning to SD-WAN to reduce MPLS costs, simplify branch IT, increase agility, and deliver an improved user experience. But, securing SaaS and internet-bound traffic for all users at all locations—without compromising on security—can present obstacles....
Read More
1 2 3 4