Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

Remote Workers: How to Stay Productive and Safe

In light of current events, many companies are encouraging or mandating that staff adopt a work-from-home policy. For modern tech companies, the infrastructure and policy...

Managing Security and Cyber Risk in 2020: Loss of trust and the rise of...

In 2020 companies face myriad security challenges. Some are regulatory, such as the European Union’s upcoming ruling on whether Canada’s privacy laws comply with the General Data Protection...

How to Protect Multicloud Environments with a Virtual Firewall

By Tiju Cherian Virtualization technology is powering a momentous revolution in today’s modern data centres and clouds, leading to designs that are commonly a mix...

7 Key Security Risks to Address when Adopting SaaS Applications

By Shannon Emmons Infrastructure? Who needs it. The modern organization is ditching traditional on-premise software and related infrastructure in favour of software-as-a-service (SaaS) offerings.  SaaS...

Why Basic Security Compliance Isn’t Enough for Healthcare Orgs

The leading concern of healthcare industry executives is compliance, according to a recent study by endpoint security vendor Carbon Black. But too many organizations — even those...

5 Lessons for Better Security from a Friendly Hacker

Hackers may be the top adversary of the IT security professional, to be sure, but hackers can also be valuable teachers, said Keren Elazari, a...

What Every Business Should Know About Zero-Trust Security

It may be getting a lot of renewed attention lately, but zero trust is not a new concept. Security professionals have been promoting it for almost...

5 Solutions to Improve Your Security Posture for Cybersecurity Awareness Month

October is Cybersecurity Awareness Month, an ideal time for organizations to assess their security posture. From identity theft to ransomware to phishing attacks, there has been a recent...

How Security Went from a Hurdle to a Selling Point in the Cloud

Today, the world faces an increasingly complex cybersecurity landscape, defined by an unprecedented number of internet-connected devices — the number of which is expected to reach nearly...

Phishing in K–12: How to Avoid Taking the Bait

Cybersecurity is critical to making sure students are safe as they use digital tools. In school systems that provide one-to-one devices to students, phishing is a...

Must Read