Cloud Security October 19, 2023 Endpoint security in the cloud: What you need to know 9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security…
Data Protection May 14, 2021 Cloud Data Privacy: Now, Where Did I Put Those Keys? 3 min read - Let’s say you’re about to walk out of the house and realize you’ve forgotten your keys. The first thing a family member will probably ask you is “Where did you last have them?” But at work, asking for the keys…
Cloud Security July 2, 2019 Head in the Clouds? Stay Grounded With Holistic Cloud Security 3 min read - Whether your journey to the cloud is just beginning, in progress or already completed, there are many design and cloud security questions you should address upfront to avoid future pitfalls.
CISO April 25, 2019 Set Expectations and Boundaries With Your Security Program to Minimize Risk 3 min read - Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
August 7, 2018 Users Played by Cryptojacking Scam on Popular Gaming Platform 2 min read - Cloud gaming service Steam pulled a game from its library on July 30 after users reported that it was actually a cryptojacking scam.
Cloud Security May 21, 2018 Spotlight Your Data Within Shadow IT 2 min read - A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
Intelligence & Analytics March 6, 2018 The Security Operations Center Is Evolving Into a Risk Analytics Center 3 min read - The traditional mission of security is evolving under the influence of several key trends regarding the functions, staffing, processes and core capabilities of the security operations center.
April 17, 2017 Businesses Take a Strategic Turn Toward Encryption 2 min read - More organizations are taking a strategic stance to encryption, and they are deploying a range of technologies and techniques to keep data safe.
Cloud Security September 19, 2016 Tame the Dangerous Combination of Mobile and Cloud With EMM and a CASB 3 min read - Many security analysts use either an EMM solution or CASB to protect their enterprise, but few recognize the importance of deploying both.
Endpoint September 14, 2016 IBM MaaS360 Goes Global to Keep Data Local 4 min read - MaaS360 empowers organizations to fully enable, manage and secure their mobile devices, apps, docs and data on a global scale.