Cloud Security March 8, 2017 Hybrid Cloud Adoption: The Logical Next Step Toward Innovation and Modernization 3 min read - Companies all over the world are beginning to recognize the potential of hybrid cloud to deliver opportunities for innovation and revenue growth.
Intelligence & Analytics March 7, 2017 From Linear to Orbital: Rethinking Defense in Depth 3 min read - Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
Cloud Security March 6, 2017 Closing Cloud Security Gaps at Every Step of the Migration Process 3 min read - When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
Data Protection February 28, 2017 How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability 4 min read - It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
Cloud Security February 20, 2017 Shadow IT Comes of Age 3 min read - Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.
February 16, 2017 Shadow IT Clouds Security 2 min read - A recent study revealed that security professionals face a new kind of shadow IT due to the widespread migration of custom apps to the cloud.
February 9, 2017 Hook, Line and Scammer: New Phishing Attack Favorite Reels In Cloud Storage 2 min read - The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.
Security Services February 6, 2017 New Approaches to Cybersecurity Drive IT Innovation 2 min read - To respond to ever-increasing cyberthreats, IT professionals have developed new security methods that drive sustained IT innovation.
Endpoint February 3, 2017 The Zero Trust Model for Living in a Hacked World 3 min read - The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
Data Protection February 3, 2017 Does Security Travel With Your Data? Three Tips for Protecting Cloud-Bound Sensitive Data 3 min read - To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.