Latest Posts

3013a8d01542d3101f0a905ab013f00a

Shadow IT: The Invisible Network

November 14, 2017 Added by:Chris Jordan

Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.

Comments  (0)

708a1c1e996937464e2d045763bf3fc4

4 Questions Businesses Must Ask Before Moving Identity into the Cloud

November 08, 2017 Added by:Dave Hendrix

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

Comments  (0)

1652a0b8730e4cd4fec952262d1bed73

Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks

November 07, 2017 Added by:Asaf Cidon

Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Category #1 Cyberattacks: Are Critical Infrastructures Exposed?

November 07, 2017 Added by:Jalal Bouhdada

Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

November 03, 2017 Added by:Jackson Shaw

A global survey revealed a lot of eye-opening facts about people’s snooping habits on their company’s network.

Comments  (0)

3cf030edb83351856102235bcee85613

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security

November 03, 2017 Added by:Eddy Bobritsky

Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)