Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

Don’t Let Security Go Up, Up and Away (in the Clouds), Start with Data

Security teams can’t defend what they can’t see. As organizations move more workloads to the cloud, security teams need added visibility into these new workloads or they...

Why and How to Achieve ISO 27001 Certification

The security of sensitive information should be a top priority for any business. From client phone numbers to financial details, if this data is breached and lands...

Why You Need Zero-Day Endpoint Protection

Securing the enterprise against malicious actors requires multiple components in today’s threat landscape. This is commonly labeled as “defence in depth” and describes how layering defence capabilities...

What is a WAF and Do I Need One?

A developer friend once told me “web applications are the drywall of the internet.” What he meant was, web development has become so trivial it’s too easy...

The Case for Managed SIEM

One of the first major projects that I was assigned to was a managed SIEM; we were in the process of onboarding a new customer who had...

How SonicWall’s New Solutions Secure Dispersed Businesses and Branch Locations

There’s nothing normal about the “new business normal.” The past few months have represented a complete shift in the way we think of work — and with vastly more employees...

The Role of Artificial Intelligence in Data Security

Organizations across the globe have embraced artificial intelligence, adopting production software and tools that leverage computer learning to automate and streamline essential business processes. However, few have deployed...

Qualitative vs Quantitative Risk Assessments

Risk assessments are basically risk management on a singular level; it is the point in time where a company examines its threat landscape to see if new...

ONTAP 9.3 Security Enhancements

The internet touches pretty much every aspect of our lives these days, but typically we don’t devote a whole lot of mind share to cybersecurity. So, without...

Managing Business Growth vs. Compliance

Have you ever tried gardening? This may seem like a random question, but if you have tried it before you would know having the right tools...

Must Read