1.888.749.9800

News & Events

  • Permalink Gallery

    How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

by Megan Thudium, writer, IT Security Central, January 25, 2018

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, […]

By |February 5th, 2018|News & Events|Comments Off on How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak
  • Permalink Gallery

    Protecting Systems and Data for a Traveling Workforce is Crucial

Protecting Systems and Data for a Traveling Workforce is Crucial

by Samuel Greengard, writer, Security Roundtable, January 24, 2018

Mobility is at the center of today’s enterprise. Employees rely on smartphones, tablets, and personal computers to access data anywhere and at any time. It’s no news flash that these devices are now a critical piece of the enterprise productivity scheme. Yet, all the gain doesn’t come without some pain: employees carrying devices and […]

By |January 25th, 2018|News & Events, Security Breach|Comments Off on Protecting Systems and Data for a Traveling Workforce is Crucial

The Internet of Things: Still Lots for You to Learn

by John Edwards, InformationWeek, January 11, 2018

IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things.

The Internet of Things (IoT) is already making a significant impact in a variety of business areas, including industrial monitoring and production, supply chain tracking, and multiple […]

By |January 23rd, 2018|IoT, News & Events|Comments Off on The Internet of Things: Still Lots for You to Learn

Is a Cyber Pearl Harbor a Real Threat?

by Samuel Greengard, writer, Baseline, December 12, 2017

In recent weeks, U.S. financial institutions such as JP Morgan Chase, Capital One and Wells Fargo have undergone sustained cyber-attacks from sources that security experts say could be a hostile foreign government or terrorist organization. Some experts, including Defense Secretary Leon Panetta, have cautioned that this distributed denial-of-service (DDoS) activity could foreshadow […]

By |December 14th, 2017|News & Events|Comments Off on Is a Cyber Pearl Harbor a Real Threat?

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take.

The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather […]

By |November 15th, 2017|IoT, News & Events|Comments Off on Cloud security and IoT are the new peanut butter and jelly

Fighting Cyber-Threats With Innovative Tech

by Samuel Greengard, business & technology reporter, Baseline, Oct. 24, 2017

Increasingly sophisticated and dangerous cyber-threats require more innovative security approaches, including advanced automation tools, AI and blockchain.

The complexities of today’s cyber-security environment aren’t lost on anyone. It’s increasingly difficult to spot threats, detect intrusions, and thwart hackers and cyber-thieves.

“A cruise through the latest headlines about breaches is sobering,” says […]

By |October 24th, 2017|News & Events, Security Breach|Comments Off on Fighting Cyber-Threats With Innovative Tech

No Compromises with the Latest Cybersecurity Threats

by Samuel Greengard, business & technology reporter, ChannelProNetwork, Sept. 8, 2017

Business process compromise attacks represent a growing risk. But channel pros can help their clients address the problem.

AS THE DIGITAL AGE UNFOLDS, it’s increasingly clear that the weakest link in cybersecurity is humans. People click bad links, open infected files, and succumb to an array of other social engineering […]

By |September 12th, 2017|News & Events, Security Breach|Comments Off on No Compromises with the Latest Cybersecurity Threats
  • Permalink Gallery

    Ethical hacking: At WPI, a search for computer vulnerabilities

Ethical hacking: At WPI, a search for computer vulnerabilities

by Kaitlin Milliken, Correspondent, Worcester Telegram, July 16, 2017

WORCESTER – Students participating in Worcester Polytechnic Institute’s Cyber Security Club stare at their laptop screens, typing long lines of code.

They hope to find vulnerabilities in software and hack into a computer system. Each task they complete earns points.

Alex Gaines, president of the club, anticipates […]

By |July 17th, 2017|News & Events|Comments Off on Ethical hacking: At WPI, a search for computer vulnerabilities
  • Permalink Gallery

    Security Experts Share Top Tips for Protecting Unstructured Data

Security Experts Share Top Tips for Protecting Unstructured Data

by Nate Lord, Digital Guardian, May 22, 2017

19 security professionals and business leaders share their top tips for protecting unstructured data.

From the contents of emails to intellectual property, business plans, proprietary training documentation, and much more, most enterprises manage vast amounts of unstructured data containing valuable and sensitive information. The sheer volume of unstructured data created and managed by most […]

By |May 23rd, 2017|News & Events|Comments Off on Security Experts Share Top Tips for Protecting Unstructured Data

How to secure data across multiple platforms

by Esther Shein, Contributing Writer, enterprise.net, April 24, 2017

When you adopt cloud services, some of your data is inevitably out of your direct control. Here’s what you need to know.

By now, moving at least some business processes to the cloud is not a question of if but when. So how do you keep your information safe while embracing all […]

By |April 26th, 2017|News & Events, Security Breach, Uncategorized|Comments Off on How to secure data across multiple platforms
  • Permalink Gallery

    US Border Policy Shifts May Drive Changes in Laptop Security

US Border Policy Shifts May Drive Changes in Laptop Security

by Ericka Chickowski, Contributing Writer, Dark Reading, March 31, 2017

In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

The new travel ban enacted by the U.S. Department of Homeland Security for laptops in the cabin of flights from certain countries may have corporate risk managers revisiting policies about […]

By |April 5th, 2017|News & Events, Security Breach|Comments Off on US Border Policy Shifts May Drive Changes in Laptop Security
  • Permalink Gallery

    Hacking of Facebook pages possible, but not probable, experts say

Hacking of Facebook pages possible, but not probable, experts say

by Kayla Canne, Sun Chronicle Staff, March 4, 2017

James Lang, a selectman candidate before he was eliminated in February’s preliminary election, was caught with Facebook posts disparaging Muslims. He apologized, told The Sun Chronicle he would quit the race, and shut down his Facebook page.

Two days later, Selectman Paul Belham was found with anti-Muslim posts on his Facebook page, […]

By |April 4th, 2017|News & Events, Security Breach|Comments Off on Hacking of Facebook pages possible, but not probable, experts say

Firm’s Data Storage Plan Out of This World

by Garrett Reim,  Los Angeles Business Journal, January 27, 2017

INTERNET: Startups look to satellites for higher security.

Cloud Constellation Corp. has a far-flung idea.

As businesses and governments consider ways to protect data in light of increased cyberattacks and surveillance, the startup is offering them a chance to put their information out of reach by storing it on servers within satellites […]

By |February 1st, 2017|News & Events|Comments Off on Firm’s Data Storage Plan Out of This World

How to Secure Intellectual Property from Loss or Compromise

by Nate Lord, Digital Guardian, January 10, 2017

Data Protection experts weigh in with tips on securing intellectual property in its many forms.

Intellectual property is often among an organization’s most valuable assets, yet it’s also vulnerable to threat and compromise, particularly the vast amounts of intellectual property stored electronically today. Intellectual property can take many forms, from general knowledge about […]

By |January 11th, 2017|News & Events|Comments Off on How to Secure Intellectual Property from Loss or Compromise
  • Permalink Gallery

    Want a board-level cybersecurity expert? They’re hard to find

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016

Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.

Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only in the rarest of circumstances.

Nowadays, boards […]

By |November 16th, 2016|News & Events|Comments Off on Want a board-level cybersecurity expert? They’re hard to find