Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

How to Protect Multicloud Environments with a Virtual Firewall

By Tiju Cherian Virtualization technology is powering a momentous revolution in today’s modern data centres and clouds, leading to designs that are commonly a mix...

7 Key Security Risks to Address when Adopting SaaS Applications

By Shannon Emmons Infrastructure? Who needs it. The modern organization is ditching traditional on-premise software and related infrastructure in favour of software-as-a-service (SaaS) offerings.  SaaS...

Why Basic Security Compliance Isn’t Enough for Healthcare Orgs

The leading concern of healthcare industry executives is compliance, according to a recent study by endpoint security vendor Carbon Black. But too many organizations — even those...

5 Lessons for Better Security from a Friendly Hacker

Hackers may be the top adversary of the IT security professional, to be sure, but hackers can also be valuable teachers, said Keren Elazari, a...

What Every Business Should Know About Zero-Trust Security

It may be getting a lot of renewed attention lately, but zero trust is not a new concept. Security professionals have been promoting it for almost...

5 Solutions to Improve Your Security Posture for Cybersecurity Awareness Month

October is Cybersecurity Awareness Month, an ideal time for organizations to assess their security posture. From identity theft to ransomware to phishing attacks, there has been a recent...

How Security Went from a Hurdle to a Selling Point in the Cloud

Today, the world faces an increasingly complex cybersecurity landscape, defined by an unprecedented number of internet-connected devices — the number of which is expected to reach nearly...

Phishing in K–12: How to Avoid Taking the Bait

Cybersecurity is critical to making sure students are safe as they use digital tools. In school systems that provide one-to-one devices to students, phishing is a...

5 Tips for Keeping Your Small Business Secure

While it’s usually the big-name organizations that make the news when they get hit with a cyberattack, Verizon’s 2018 Data Breach Investigation Report found that 58 percent of...

Easier Wi-Fi Planning, Security & Management from the Cloud

Wi-Fi access is ubiquitous, but it’s not always easy to plan, deploy, secure and manage, especially for distributed businesses and enterprises. SonicWall...

Must Read