<img src="http://www.66infra-strat.com/79881.png" style="display:none;">

Are You Sending Secure Email Messages?

Have you ever been asked to exchange a private document with your mortgage banker, realtor, accountant or doctor? Most are going to answer this question with a resounding, yes. Have you ever stopped to think if the content of that email message or its attachments were secure or not?

Safe-T interviews Andrew Hay, DataGravity CISO

There are a lot of talented people in our industry. We thought it would be a good idea to interview them for our blog and find out their thoughts and opinions on key industry issues.

Life after Microsoft Forefront UAG | Safe-T

You purchase a software product, deploy it into your production environment and then become completely dependent on it over the years. Does this sound all too familiar? For most us, this situation is quite familiar and, unfortunately, we have been left asking ourselves what to do when the software company pulls the plug on the technology. This is an even more important aspect nowadays with security products as they come and go.

2015 Global Cyber Security Threats Review & Tips for 2016 | Safe-T

If someone mentioned the term “Cyber Security” you’d surely know more about this topic today more than ever before. That’s primarily because of all the media attention due to the large number of companies that have had sensitive data and information compromised during 2015 and its effect on millions and millions of individuals worldwide. We expect the institutions that we provide our most personal data to, in fact, keep it safe.

Are Healthcare Companies Maintaining their Security Solution?

That’s a question that many of us are asking ourselves these days. It might not seem like that significant of a question at first glance, but when you really think about it do you want some random outsider knowing what your most intimate medical issues are or what prescription medications you’re taking?

Resolving the firewall politics problem

A few months ago, I was sitting in a meeting with the IT team from one of the largest bank in Africa, while discussing their pains, they mentioned that one of the most aggravating issues they have, is launching a new external facing application. The problem, they told us is the security team, "we need to connect our application front-end which resides in the DMZ to the application server which resides in the LAN, and they will not let us open any new ports in the LAN firewall…".

Struggling to show a return on investments (ROI) for Cyber Security spending?

It’s a fact, if you and your firm are not actively making investments into cyber security you are falling behind. There are many reasons why firms are not advancing this cause, but it’s most likely because they have either security complacency (check out my previous blog on the subject) or struggling to show an ROI on this type of spending. Cyber security spending can appear to be an intangible object if you aren’t sure what you are looking for.

Do you or anyone around you have “Security Complacency”?

Most all of the headlines these days continue to include information and talk about “data hack this”, “hacker that” and which security solutions are the “crown jewels”.  Because of the sustained awareness of security, you too are looking within your own realm of responsibility at work and at home in an effort to keep you, your customers and your employer safe from cyber criminals.

You want to grant your partners access to corporate resources – Now what?

If you work in either of the following teams IT/security/networks/applications/MFT in an organization which has business partners, then you probably heard the request - “we need to grant partner x access to our systems/apps/services, because otherwise we can’t do business with them…”

Does your existing mission-critical application software integrate well with Windows 10?

It’s official, Microsoft Windows 10 was officially released to the general public last month and consumers and businesses are quickly getting onboard. Microsoft describes it as: “familiar and easy to use with similarities to Windows 7 including the Start menu. It starts up and resumes fast, has more built-in security to help keep you safe, and is designed to work with software and hardware you already have.”


Subscribe to Email Updates