Most recent

How to Prevent Malware Hackers from Accessing Your Software

If you’re like most computer users, you probably wish that your machine could run faster. If you’re also like most computers, you probably lack the technical skills and knowledge to accomplish this on your own. Therefore, you might be tempted by one of a number of programs that purport to make your computer run faster with no special skills required.


Read More
16 Nov 2017

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not

Bad news for cloud proponents! The security firm Skyhigh Networks reports that 7% of Amazon S3 buckets are set to unrestricted public access, meaning that anyone with a link to the server can read it. Not only are almost one-in-ten databases completely insecure, more than a third are completely unencrypted. It’s open season on S3 implementations.

 

Read More
07 Nov 2017

Keep your Company's Data in the Right Hands with our Software-Defined Access Solution

Your organization faces a multitude of new business challenges in securing and monitoring sensitive data, providing authorized accessibility to applications, and safely sharing information in a hybrid cloud environment. Furthermore, you are expected to abide by heavy regulations and compliance standards in your industry.
Read More
01 Nov 2017

MSP: Is Your New Digital Service Compliant?

Offering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back and watch the money roll in.  
Read More
30 Oct 2017

Surprise! A New Cyber Security Compliance Just Took Effect

It's fair to say that what happens in New York affects the entire world. Thousands of companies make their home there, and some of them — Goldman Sachs, JP Morgan Chase, American Express, Citigroup, and others — can affect the economies of entire regions with the flick of a pen. Therefore, it's safe to say that a new cyber security regime , affecting companies under the governance of New York's Department of Financial Services (DFS), would have potentially global ramifications. 
Read More
22 Oct 2017

How to Reduce Your Cyber-Attack Surface Before It's Too Late

Has your attack surface increased as you've moved more workloads to the cloud? While moving to the cloud can be a great idea, it can also be a security headache for IT departments who have not increased their security staff to keep up with the demand. All it takes is one data breach to put your organization at risk and endanger the value that moving to cloud brings.

Read More
11 Oct 2017

What will Software Defined Perimeter Mean for Compliance?

Your network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physical reality of your network in the way that they once did.

Read More
03 Oct 2017

Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach 

Normally, when a company gets hacked, they're entitled to a certain amount of sympathy. Advanced malware is difficult to defend against, and the best that companies can do is sometimes not enough. Equifax, on the other hand, has decided that the aftermath of a devastating cyberattack is the best time to act like a morally-compromised bully. Reacting to the loss of personally identifying information (PII) for over 140 million Americans, their response has been entirely inadequate.

Read More
25 Sep 2017

Understanding the new Cloud Security Guidance from the CSA

At this year's Black Hat conference in July, the Cloud Security Alliance (CSA) announced new guidelines for enterprises to create secure public and private cloud computing architectures. The last time this update occurred was in 2011, which means that this update incorporates over half a decade of technological advancement. There is a significant new body of work in Guidance for Critical Areas of Focus in Cloud Computing 4.0 , and its implications will reverberate.
Read More
17 Sep 2017

Will Platform Consolidation Dismantle Your Security Solutions?

The most logical step, following proliferation, is consolidation. This is a trend that we've seen in nearly every other industry after periods of intense innovation, and it's a trend that we're seeing now in information security.
Read More
06 Sep 2017

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

close

Contact Us:

Contact Us: