Search Results for: cloud computing Blog Post How to mitigate your cloud computing risks December 4, 2019 We have come across individuals working at companies of all different sizes, knowledge levels, and specialties from all different places... Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT... Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s... Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... Blog Post Data Breach Hits Timehop, Compromises 21 Million Users’ Data July 9, 2018 Timehop, a popular application that reclaims old photos and posts by syncing to social media profiles has revealed a data... Blog Post Mobile Security – In the Words of Experts May 23, 2016 With all the buzz around mobile security lately, we have decided to compile a list of some of the best mobile... Blog Post Seven Steps to Strong Cloud Security January 30, 2020 Working in a cloud environment has become commonplace in all kinds of companies. It seamlessly allows work to be done... Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the... Blog Post Only 3 of the Top 100 International Airports Meet Basic Cybersecurity Requirements February 7, 2020 In recent research, the world’s top 100 international airports were tested for checking if they meet the basic cybersecurity requirements.... Blog Post What is IoT Security? February 10, 2020 The Internet of Things (IoT) has become one of the most important technologies in the 21st century. Today, we can... Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make... Blog Post Crypto Mining Malware Uses Amazon’s Cloud to Hijack Computers May 29, 2018 A new survey by IBM Managed Security Services has revealed that hackers are increasingly hijacking computers to secretly mine cryptocurrencies,... Blog Post Timothy Eades on Software-based Segmentation November 3, 2016 With over 20 years of leadership experience in sales, marketing, and executive management at the CEO level, Tim has deep...
Blog Post How to mitigate your cloud computing risks December 4, 2019 We have come across individuals working at companies of all different sizes, knowledge levels, and specialties from all different places...
Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT...
Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s...
Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
Blog Post Data Breach Hits Timehop, Compromises 21 Million Users’ Data July 9, 2018 Timehop, a popular application that reclaims old photos and posts by syncing to social media profiles has revealed a data...
Blog Post Mobile Security – In the Words of Experts May 23, 2016 With all the buzz around mobile security lately, we have decided to compile a list of some of the best mobile...
Blog Post Seven Steps to Strong Cloud Security January 30, 2020 Working in a cloud environment has become commonplace in all kinds of companies. It seamlessly allows work to be done...
Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the...
Blog Post Only 3 of the Top 100 International Airports Meet Basic Cybersecurity Requirements February 7, 2020 In recent research, the world’s top 100 international airports were tested for checking if they meet the basic cybersecurity requirements....
Blog Post What is IoT Security? February 10, 2020 The Internet of Things (IoT) has become one of the most important technologies in the 21st century. Today, we can...
Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make...
Blog Post Crypto Mining Malware Uses Amazon’s Cloud to Hijack Computers May 29, 2018 A new survey by IBM Managed Security Services has revealed that hackers are increasingly hijacking computers to secretly mine cryptocurrencies,...
Blog Post Timothy Eades on Software-based Segmentation November 3, 2016 With over 20 years of leadership experience in sales, marketing, and executive management at the CEO level, Tim has deep...