Most recent

The Truth About The Deloitte Security Breach 

We’ve recently discussed the Equifax breach , and how terrible it was, but the credit giant is not the only company that’s been impressing us with a bad breach response. Deloitte, a firm which is ironically one of the world’s largest cyber security consultants, has been breached as well.
Read More
22 Nov 2017

How to Prevent Malware Hackers from Accessing Your Software

If you’re like most computer users, you probably wish that your machine could run faster. If you’re also like most computer users, you probably lack the technical skills and knowledge to accomplish this on your own.

Read More
16 Nov 2017

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not

Bad news for cloud proponents! The security firm Skyhigh Networks reports that 7% of Amazon S3 buckets are set to unrestricted public access, meaning that anyone with a link to the server can read it.

Read More
07 Nov 2017

Keep your Company's Data in the Right Hands with our Software-Defined Access Solution

Your organization faces a multitude of new business challenges in securing and monitoring sensitive data, providing authorized accessibility to applications, and safely sharing information in a hybrid cloud environment.

Read More
01 Nov 2017

MSP: Is Your New Digital Service Compliant?

Offering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back and watch the money roll in.  
Read More
30 Oct 2017

Surprise! A New Cyber Security Compliance Just Took Effect

It's fair to say that what happens in New York affects the entire world. Thousands of companies make their home there, and some of them — Goldman Sachs, JP Morgan Chase, American Express, Citigroup, and others — can affect the economies of entire regions with the flick of a pen. 

Read More
22 Oct 2017

How to Reduce Your Cyber-Attack Surface Before It's Too Late

Has your attack surface increased as you've moved more workloads to the cloud? While moving to the cloud can be a great idea, it can also be a security headache for IT departments who have not increased their security staff to keep up with the demand. All it takes is one data breach to put your organization at risk and endanger the value that moving to cloud brings.

Read More
11 Oct 2017

What will Software Defined Perimeter Mean for Compliance?

Your network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physical reality of your network in the way that they once did.

Read More
03 Oct 2017

Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach 

Normally, when a company gets hacked, they're entitled to a certain amount of sympathy. Advanced malware is difficult to defend against, and the best that companies can do is sometimes not enough.

Read More
25 Sep 2017

Understanding the new Cloud Security Guidance from the CSA

At this year's Black Hat conference in July, the Cloud Security Alliance (CSA) announced new guidelines for enterprises to create secure public and private cloud computing architectures. 
Read More
17 Sep 2017

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: