1.888.749.9800

News & Events

Firm’s Data Storage Plan Out of This World

by Garrett Reim,  Los Angeles Business Journal, January 27, 2017

INTERNET: Startups look to satellites for higher security.

Cloud Constellation Corp. has a far-flung idea.

As businesses and governments consider ways to protect data in light of increased cyberattacks and surveillance, the startup is offering them a chance to put their information out of reach by storing it on servers within satellites […]

By |February 1st, 2017|News & Events|Comments Off on Firm’s Data Storage Plan Out of This World

How to Secure Intellectual Property from Loss or Compromise

by Nate Lord, Digital Guardian, January 10, 2017

Data Protection experts weigh in with tips on securing intellectual property in its many forms.

Intellectual property is often among an organization’s most valuable assets, yet it’s also vulnerable to threat and compromise, particularly the vast amounts of intellectual property stored electronically today. Intellectual property can take many forms, from general knowledge about […]

By |January 11th, 2017|News & Events|Comments Off on How to Secure Intellectual Property from Loss or Compromise
  • techtarget
    Permalink Gallery

    Want a board-level cybersecurity expert? They’re hard to find

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016

Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.

Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only in the rarest of circumstances.

Nowadays, boards […]

By |November 16th, 2016|News & Events|Comments Off on Want a board-level cybersecurity expert? They’re hard to find
  • cso
    Permalink Gallery

    Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

by Josh Fruhlinger, CSO, October 7, 2016

Corporate chaos

The supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea’s Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships’ entry […]

By |October 7th, 2016|News & Events, Security Breach|Comments Off on Down but not out of options: How to keep IT security together in a company that’s gone bankrupt
  • digital guardian
    Permalink Gallery

    Cyber Security Investments: Experts Discuss Detection vs. Prevention

Cyber Security Investments: Experts Discuss Detection vs. Prevention

by Nate Lord, Digital Guardian, September 26, 2016

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.

Enterprises are increasingly aware of the growing need to invest in sound security measures capable of securing valuable company data in the ever-evolving threat landscape. But in the face of budget constraints, some companies find themselves […]

By |September 27th, 2016|News & Events, Security Breach|Comments Off on Cyber Security Investments: Experts Discuss Detection vs. Prevention
  • construction dive
    Permalink Gallery

    A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

by Kim Slowey, Construction DIVE, August 11, 2016

Construction companies are infamous for their reluctance to adopt the latest technologies. Most of the largest companies have made the leap, but for small and mid-sized firms, the process continues inch by inch.

However, as contractors join the digital age and begin to reap the benefits of becoming more connected with fellow […]

By |August 11th, 2016|News & Events, Security Breach|Comments Off on A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

The Brave New World Of Cloud Application Security

by Teresa Meek, Workday Contributor, Forbes, August 3, 2016

As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it.

What Smaller Businesses Can’t Do

For years, security concerns kept companies from migrating their data […]

By |August 4th, 2016|Big Data, News & Events|Comments Off on The Brave New World Of Cloud Application Security

6 ways to reduce Shadow IT security risks

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, July 19, 2016

Summary: A rapidly growing trend, “Shadow IT” is the use of unapproved IT systems and solutions within organizations. End users are increasingly bypassing IT in favor of third party solutions and services. In this article, we explore the security risks of Shadow IT, and a few ways to […]

By |July 19th, 2016|News & Events, Security Breach|Comments Off on 6 ways to reduce Shadow IT security risks
  • Cup of Joe
    Permalink Gallery

    5 important web application security trends of the near future

5 important web application security trends of the near future

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, April 19, 2016

Summary: As security breaches rise, enterprise web application security is an increasingly important topic. You must stay ahead of evolving security trends in order to keep your data and applications safe. How will web application security evolve in the coming year? What web application security threats can we […]

By |April 19th, 2016|News & Events, Security Breach|Comments Off on 5 important web application security trends of the near future
  • InfoSecLogo-300x107
    Permalink Gallery

    Who Should Be Able to Opt Out of Security Awareness training – and How

Who Should Be Able to Opt Out of Security Awareness training – and How

by Ian Palmer, researcher for InfoSec Institute, March 9, 2016

Brad Johnson is adamant that no one in an organization should be exempt from security awareness training. Not the CEO. Not the chief security officer. Nobody.

Johnson, the vice president of SystemExperts, says that making exceptions on the security awareness training front would only open companies […]

By |March 10th, 2016|News & Events, Security Breach|Comments Off on Who Should Be Able to Opt Out of Security Awareness training – and How

Don’t Neglect the Fundamentals of Identity Management

Posted by Ishan Kumar on 2/11/16 8:52 AM

Paul Hill is a Senior Consultant with SystemExperts. Previously, he worked in the IT Department of the Massachusetts Institute of Technology where he played a leadership role in the evolution of identity services. He is recognized as one of the industry’s foremost experts in Microsoft technology, […]

By |February 15th, 2016|News & Events, Security Breach|Comments Off on Don’t Neglect the Fundamentals of Identity Management

Security compliance: How much is enough?

by Michael O’Dwyer, contributor, The PULSE of IT, November 23, 2015

Excerpt: Businesses should take baby steps when it comes to security compliance, starting with a security standard that is easier to comply with, like the ISO/IEC 27002, which deals with end-to-end security.

“It is easy to understand, and it is up to the company to determine the level of detail. […]

By |November 30th, 2015|News & Events, PCI Compliance, Uncategorized|Comments Off on Security compliance: How much is enough?

Identity and Access Management – All access pass

An SC Magazine eBook Publication – Identity Access Management, by Karen Epper Hoffman, October 2015

Security executives are looking beyond basic user name and password to secure access to the enterprise, which is becoming more complicated with remote access, cloud services and personal devices.

Knowing who is on your network and able to access your information and resources is arguably the basic foundation on which good enterprise […]

By |October 30th, 2015|News & Events|Comments Off on Identity and Access Management – All access pass

Hacking your back pocket

by Sue Poremba, security and technology writer, Central Desktop, a PGi company, October 27, 2015

Convenient, but vulnerable

There are two primary reasons why your smartphone is more likely to be hacked than other devices, according to Paul Hill, senior consultant with SystemExperts: the physical security of the devices and the use of untrustworthy networks.

“Mobile devices are more likely […]

By |October 28th, 2015|News & Events|Comments Off on Hacking your back pocket

Holiday Marketing Guide: 2015 Trends That Will Drive Sales

Nicole Fallon Taylor, Business News Daily Assistant Editor  

With two months to go before Thanksgiving, shoppers are already gearing up for a busy holiday sale season. Data from Google revealed that more than a quarter of consumers begin their holiday shopping before Halloween, so retailers need to be ready for […]

By |September 30th, 2015|News & Events|Comments Off on Holiday Marketing Guide: 2015 Trends That Will Drive Sales