The Sobering Facts About Cyber Crime
It’s easy to feel complacent about online security when you’ve invested in the latest hardware and software protection. Unfortunately, what a lot of organizations don’t realize is that even the best...
View ArticleMobile Device Management
The rise of bring your own device (BYOD) policies in corporate network environments has led to greater flexibility for employees, as well as lower infrastructure costs for businesses and government...
View ArticleHave you ever had the challenge of deploying a SIEM in your environment?
Managing security with a SIEM in any environment is a complex adventure. Protecting your data and infrastructure and meeting regulatory requirements may seem like a daunting task. It is difficult...
View ArticleManaging Privileged Access to Sensitive Resources
Current trends in network computing that favor virtualization and cloud computing — combined with the financial imperative to outsource services and consolidate data center resources — have made...
View ArticlePeer-to-Peer Communication Challenges in the Cloud
Security practices have changed significantly in the last decade. It used to be sufficient to set up firewall rules to close the intranet off from the internet. Nowadays, companies rely more and more...
View Article17 Best Practices for Maintaining Data Security in a Business Environment
No matter what business you’re in, protecting your data from threats and accidental compromises is a critical concern. Several recent high-profile incidents have exposed just how vulnerable retailers,...
View ArticleSecurity and Operational Efficiency
Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy...
View ArticleHow to Implement Server Virtualization in Your Business
In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server...
View ArticleUnderstanding Cloud Security Models
When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach...
View ArticleTraditional and Software-Defined Networking
Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud...
View Article