Category

Digital Transformation
Photo by Philipp Katzenberger on Unsplash What is “Endpoint Security“ While the concept of “Endpoint Security” is simple, its execution and operation aren’t. What exactly is “Enpoint Security” and what is an “Endpoint Security Solution“ Endpoint security is the concept of security measures placed at each “endpoint” or device accessing an enterprise network. This can include desktops, laptops,...
Read More
Remote working is becoming necessary in this quickly changing business climate. As we move our workforce from within our offices to within their living room, the security foundations we’ve established to protect our infrastructure and data at the office must also migrate with remote working. The movement has been rapid. Only a few businesses were...
Read More
Written by Chris Peterson, Forbes According to a 2019 survey from The Conference Board of more than 800 international CEOs and 600 C-suite members, cybersecurity is cited as the top external concern. The Conference Board also notes (via CIO Dive) that malicious cyber activity cost the economy up to $109 billion in 2016. CEOs and boards that seek...
Read More
Deep learning is a term that you are most likely hearing often. We have entered into an advanced age of technology and there are a lot of questions circulating around this subject. What is deep learning? Is it artificial intelligence? When will we see more evidence of AI integrated into our lives? The answer is,...
Read More
Written by: Teju ShyamsundarSenior Product Marketing Manager at Okta The current state of device based access control It’s no secret that devices have changed the way we work. Mobility has transformed the enterprise enough to redefine the term “mobile device.” With modern management techniques for mobile form factors as well as laptops and tablets, the...
Read More
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
Mobile phones have a huge impact on the day-to-day lives and the way one communicates with the world. With leading mobile messaging platform WhatsApp recently revealing a major security flaw that could let hackers access phones, it’s time to reconsider safety measures for mobile networks. Even in the corporate world, it’s hard to find an...
Read More
Written by: Michael Busselen of Crowdstrike The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,”includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends...
Read More
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for...
Read More
Written By: Jen Toscano As enterprises embrace digital transformation, they must find a new way to manage networking and security. Many are turning to SD-WAN to reduce MPLS costs, simplify branch IT, increase agility, and deliver an improved user experience. But, securing SaaS and internet-bound traffic for all users at all locations—without compromising on security—can present obstacles....
Read More
1 2 3