Cloud Security

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Why Cloud Security Is a Shared Responsibility

October 13, 2017 Added by:Sanjay Kalra

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

Comments  (0)

02fe982eecea0dda30ffa3657a08097b

How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

How Does UC in the Cloud Impact Your Security Posture?

July 20, 2017 Added by:Myk Konrad

To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.

Comments  (0)

8259d904d48c0e93d3edf9383230de4c

Cloud Control: Key Points to Consider When Going to the Cloud

May 24, 2017 Added by:Luis Corrons

Establishing a solid plan when deciding to transition to the cloud is essential. By understanding the costs to store, transfer, and retrieve data, organizations can protect themselves from making a costly mistake.

Comments  (0)

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Cloud-Based Access Governance: Organizational Continuity Achieved

May 09, 2017 Added by:Dean Wiech

Cloud-based access governance can pull up a portal listing your web-based applications, whether they are hosted in the cloud or running locally within the organization, and can authenticate in the network.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

SWIFT Attacks are Evolving - Is Your Segmentation Strategy?

April 28, 2017 Added by:Jesse McKenna

As we continue to see attacks levied against banking and payment applications, the need for fine-grained visibility and control over all aspects of communication between system components will only rise.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

What Is Your Security Canary?

April 13, 2017 Added by:Jesse McKenna

Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)

C33ba283f54a267b479325c67e2ea466

4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Security Policies Matter for Disaster Recovery

March 02, 2017 Added by:Avishai Wool

Prevention is no longer enough to ensure robust readiness to unplanned incidents and cyber threats. Organizations also need to ensure that their incident response is as slick and unified as possible.

Comments  (0)

33e341295f31dc98f191961ddd26bcba

When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?

February 16, 2017 Added by:Jeff Erramouspe

Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.

Comments  (0)

E61bd0e5d76b76868ffe7b6574f67796

Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »