Security Services February 6, 2017 New Approaches to Cybersecurity Drive IT Innovation 2 min read - To respond to ever-increasing cyberthreats, IT professionals have developed new security methods that drive sustained IT innovation.
Endpoint February 3, 2017 The Zero Trust Model for Living in a Hacked World 3 min read - The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
Data Protection February 3, 2017 Does Security Travel With Your Data? Three Tips for Protecting Cloud-Bound Sensitive Data 3 min read - To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
Network January 30, 2017 Secure SD-WAN: The First Step Toward Zero Trust Security 3 min read - A secure SD-WAN can help companies reduce costs, simplify cloud connectivity and secure their networks. This is the first step toward zero trust security.
Risk Management January 27, 2017 The Current State of IT Resilience 3 min read - According to a new report, organizations struggled to maintain IT resilience in 2016 due to challenges related to migration, downtime, the cloud and more
Application Security January 13, 2017 The CIO Must Take Charge of the Organization’s Application Portfolio 2 min read - With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
Cloud Security January 11, 2017 Adopting SaaS: Tips and Best Practices for Cloud Transformation 2 min read - Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.
Application Security January 5, 2017 SecOps Revisited: The Challenge of DevOps for Security 2 min read - Over the past 18 months, SecOps gained popularity in the developer and consumer communities as cybercriminals increasingly targeted cloud delivery models.
Cloud Security December 28, 2016 Cloud Security: Are Adopters Asking the Right Questions? 2 min read - As providers continue to evolve and differentiate from one another, consumers must ask the right questions when shopping for a cloud security solution.
Endpoint December 21, 2016 The BYOD Policy Holiday Challenge 2 min read - Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.