1.888.749.9800

News & Events

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take.

The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather […]

By |November 15th, 2017|IoT, News & Events|Comments Off on Cloud security and IoT are the new peanut butter and jelly

Fighting Cyber-Threats With Innovative Tech

by Samuel Greengard, business & technology reporter, Baseline, Oct. 24, 2017

Increasingly sophisticated and dangerous cyber-threats require more innovative security approaches, including advanced automation tools, AI and blockchain.

The complexities of today’s cyber-security environment aren’t lost on anyone. It’s increasingly difficult to spot threats, detect intrusions, and thwart hackers and cyber-thieves.

“A cruise through the latest headlines about breaches is sobering,” says […]

By |October 24th, 2017|News & Events, Security Breach|Comments Off on Fighting Cyber-Threats With Innovative Tech

No Compromises with the Latest Cybersecurity Threats

by Samuel Greengard, business & technology reporter, ChannelProNetwork, Sept. 8, 2017

Business process compromise attacks represent a growing risk. But channel pros can help their clients address the problem.

AS THE DIGITAL AGE UNFOLDS, it’s increasingly clear that the weakest link in cybersecurity is humans. People click bad links, open infected files, and succumb to an array of other social engineering […]

By |September 12th, 2017|News & Events, Security Breach|Comments Off on No Compromises with the Latest Cybersecurity Threats
  • Permalink Gallery

    Ethical hacking: At WPI, a search for computer vulnerabilities

Ethical hacking: At WPI, a search for computer vulnerabilities

by Kaitlin Milliken, Correspondent, Worcester Telegram, July 16, 2017

WORCESTER – Students participating in Worcester Polytechnic Institute’s Cyber Security Club stare at their laptop screens, typing long lines of code.

They hope to find vulnerabilities in software and hack into a computer system. Each task they complete earns points.

Alex Gaines, president of the club, anticipates […]

By |July 17th, 2017|News & Events|Comments Off on Ethical hacking: At WPI, a search for computer vulnerabilities
  • Permalink Gallery

    Security Experts Share Top Tips for Protecting Unstructured Data

Security Experts Share Top Tips for Protecting Unstructured Data

by Nate Lord, Digital Guardian, May 22, 2017

19 security professionals and business leaders share their top tips for protecting unstructured data.

From the contents of emails to intellectual property, business plans, proprietary training documentation, and much more, most enterprises manage vast amounts of unstructured data containing valuable and sensitive information. The sheer volume of unstructured data created and managed by most […]

By |May 23rd, 2017|News & Events|Comments Off on Security Experts Share Top Tips for Protecting Unstructured Data

How to secure data across multiple platforms

by Esther Shein, Contributing Writer, enterprise.net, April 24, 2017

When you adopt cloud services, some of your data is inevitably out of your direct control. Here’s what you need to know.

By now, moving at least some business processes to the cloud is not a question of if but when. So how do you keep your information safe while embracing all […]

By |April 26th, 2017|News & Events, Security Breach, Uncategorized|Comments Off on How to secure data across multiple platforms
  • Permalink Gallery

    US Border Policy Shifts May Drive Changes in Laptop Security

US Border Policy Shifts May Drive Changes in Laptop Security

by Ericka Chickowski, Contributing Writer, Dark Reading, March 31, 2017

In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

The new travel ban enacted by the U.S. Department of Homeland Security for laptops in the cabin of flights from certain countries may have corporate risk managers revisiting policies about […]

By |April 5th, 2017|News & Events, Security Breach|Comments Off on US Border Policy Shifts May Drive Changes in Laptop Security
  • Permalink Gallery

    Hacking of Facebook pages possible, but not probable, experts say

Hacking of Facebook pages possible, but not probable, experts say

by Kayla Canne, Sun Chronicle Staff, March 4, 2017

James Lang, a selectman candidate before he was eliminated in February’s preliminary election, was caught with Facebook posts disparaging Muslims. He apologized, told The Sun Chronicle he would quit the race, and shut down his Facebook page.

Two days later, Selectman Paul Belham was found with anti-Muslim posts on his Facebook page, […]

By |April 4th, 2017|News & Events, Security Breach|Comments Off on Hacking of Facebook pages possible, but not probable, experts say

Firm’s Data Storage Plan Out of This World

by Garrett Reim,  Los Angeles Business Journal, January 27, 2017

INTERNET: Startups look to satellites for higher security.

Cloud Constellation Corp. has a far-flung idea.

As businesses and governments consider ways to protect data in light of increased cyberattacks and surveillance, the startup is offering them a chance to put their information out of reach by storing it on servers within satellites […]

By |February 1st, 2017|News & Events|Comments Off on Firm’s Data Storage Plan Out of This World

How to Secure Intellectual Property from Loss or Compromise

by Nate Lord, Digital Guardian, January 10, 2017

Data Protection experts weigh in with tips on securing intellectual property in its many forms.

Intellectual property is often among an organization’s most valuable assets, yet it’s also vulnerable to threat and compromise, particularly the vast amounts of intellectual property stored electronically today. Intellectual property can take many forms, from general knowledge about […]

By |January 11th, 2017|News & Events|Comments Off on How to Secure Intellectual Property from Loss or Compromise
  • Permalink Gallery

    Want a board-level cybersecurity expert? They’re hard to find

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016

Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.

Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only in the rarest of circumstances.

Nowadays, boards […]

By |November 16th, 2016|News & Events|Comments Off on Want a board-level cybersecurity expert? They’re hard to find
  • Permalink Gallery

    Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

by Josh Fruhlinger, CSO, October 7, 2016

Corporate chaos

The supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea’s Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships’ entry […]

By |October 7th, 2016|News & Events, Security Breach|Comments Off on Down but not out of options: How to keep IT security together in a company that’s gone bankrupt
  • Permalink Gallery

    Cyber Security Investments: Experts Discuss Detection vs. Prevention

Cyber Security Investments: Experts Discuss Detection vs. Prevention

by Nate Lord, Digital Guardian, September 26, 2016

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.

Enterprises are increasingly aware of the growing need to invest in sound security measures capable of securing valuable company data in the ever-evolving threat landscape. But in the face of budget constraints, some companies find themselves […]

By |September 27th, 2016|News & Events, Security Breach|Comments Off on Cyber Security Investments: Experts Discuss Detection vs. Prevention
  • Permalink Gallery

    A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

by Kim Slowey, Construction DIVE, August 11, 2016

Construction companies are infamous for their reluctance to adopt the latest technologies. Most of the largest companies have made the leap, but for small and mid-sized firms, the process continues inch by inch.

However, as contractors join the digital age and begin to reap the benefits of becoming more connected with fellow […]

By |August 11th, 2016|News & Events, Security Breach|Comments Off on A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

The Brave New World Of Cloud Application Security

by Teresa Meek, Workday Contributor, Forbes, August 3, 2016

As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it.

What Smaller Businesses Can’t Do

For years, security concerns kept companies from migrating their data […]

By |August 4th, 2016|Big Data, News & Events|Comments Off on The Brave New World Of Cloud Application Security