Two new ways backup can protect enterprise SaaS data

Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re attractive targets for bad actors. But while there’s lots of bustle around protecting … Continue reading Two new ways backup can protect enterprise SaaS data

Defending enterprise systems during a pandemic

A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of the year, to the resurgent spikes due to a mix of additional lockdowns and c… Continue reading Defending enterprise systems during a pandemic

How to mitigate security risks as cloud services adoption spikes

Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, or AWS for system admins) amid the COVID-19 crisis. According to Gartner, clo… Continue reading How to mitigate security risks as cloud services adoption spikes

Only 12% of enterprises have fully embraced SASE

Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according to NetMotion. As the unexpected growth of remote working greatly accelerated c… Continue reading Only 12% of enterprises have fully embraced SASE

Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal computing itself. And with the pandemic having shown that endpoint management is … Continue reading Why enterprises need rugged devices with integrated endpoint management systems

Enable secure remote workspaces without trashing your entire IT infrastructure

Roughly 12 months ago, when the world shifted seemingly overnight to work-from-home, few companies were well-positioned to seamlessly scale their remote work solutions. Legacy remote desktop solutions, like Virtual Desktop Infrastructure (VDI) and Desk… Continue reading Enable secure remote workspaces without trashing your entire IT infrastructure

Cybersecurity spending for critical infrastructure to reach $105.99 billion in 2021

Cybersecurity spending in critical infrastructure has been little impacted by the COVID-19 pandemic, save for some reshuffling on where that spend is most needed. The effect has been mostly in increased demand for secure remote connectivity. Most of th… Continue reading Cybersecurity spending for critical infrastructure to reach $105.99 billion in 2021

Enterprises average one root access orphan key on every enterprise server

SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise networks. While CIOs say they are concerned about the security risks SSH machine iden… Continue reading Enterprises average one root access orphan key on every enterprise server

Kick off the year with a new vendor management spring cleaning strategy

Your company’s vendor management program may not be what you need to get the most out of your cybersecurity vendors, so I’ll focus on a Cyber Vendor Optimization Strategy. The goal is to synchronize your annual cyber strategy / plan with your current v… Continue reading Kick off the year with a new vendor management spring cleaning strategy

IT leaders concerned about their ability to keep up with digital transformation

IT leaders have growing concerns about their ability to keep up with digital transformation, a Dynatrace survey of 700 CIOs reveals. Traditional IT operating models with siloed teams and multiple monitoring and management solutions are proving ineffect… Continue reading IT leaders concerned about their ability to keep up with digital transformation