Applying Enterprise Access Lessons From COVID-19

The pandemic showed that VPNs were no longer the gold standard when it came to network access COVID-19 is impacting our world in many ways. One likely consequence of the pandemic will be an increase in mergers and acquisitions as the strong take over … Continue reading Applying Enterprise Access Lessons From COVID-19

Combating U.S. Election Cyberthreats

Government elections across the globe face huge cybersecurity concerns, but no more so than the upcoming U.S. presidential election in November. The entire process presents numerous opportunities for cyber hackers to skew the electoral process or even… Continue reading Combating U.S. Election Cyberthreats

Patching in the Time of Remote Work

It’s imperative that employers implement a patch cadence, regardless of whether employees agree with it This may sound controversial, but unfortunately, my experience shows it to be true: When humans are prompted to do something without risk or reward… Continue reading Patching in the Time of Remote Work

Adopting Quantum Cryptography: Why Y2Q Will Be Too Late

 Standards bodies, government organizations and research centers are weighing in on preparing for the threat that quantum computers pose to encryption. The latest from the National Institute of Standards and Technology (NIST): “The race to protect sen… Continue reading Adopting Quantum Cryptography: Why Y2Q Will Be Too Late

The Value of Data From a Consumer’s Perspective

As more consumers give up more of their personal information, they may be unaware of the value that data holds Personal data, and the need to secure it, has been prominent in the headlines over the past year. Last July, the Federal Trade Commission (F… Continue reading The Value of Data From a Consumer’s Perspective

Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap

Organizations find themselves in a quandary these days when it comes to whether they should deploy an air-gap strategy—a strategy in which secondary backup data is saved in an offsite and offline location, physically separating it from primary product… Continue reading Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap

Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap

Organizations find themselves in a quandary these days when it comes to whether they should deploy an air-gap strategy—a strategy in which secondary backup data is saved in an offsite and offline location, physically separating it from primary product… Continue reading Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap

Intelligence-Sharing in Action: COVID-19 Cyber Threat Coalition

The COVID-19 Cyber Threat Coalition shows that not only is threat intelligence-sharing possible, but we thrive with it As we’ve seen time and again, cybercriminals will use any tragic event to take advantage of people when they are emotionally vulnera… Continue reading Intelligence-Sharing in Action: COVID-19 Cyber Threat Coalition

‘The C-Suite Report’ Simplified: 4 Key Takeaways

The recently published “The C-Suite Report: The Current and Future State of Cybersecurity” by Forcepoint in partnership with WSJ Intelligence has unearthed a treasure trove of important and interesting insights on how CEOs and CISOs of som… Continue reading ‘The C-Suite Report’ Simplified: 4 Key Takeaways

Understanding the Tactics of Ransomware Attacks

Amid a global pandemic and political unrest, cyberattacks have still managed to grab headlines. Technology is considered critical infrastructure, and when ransomware strikes, it only amplifies the hardships that businesses, non-profits, organizations … Continue reading Understanding the Tactics of Ransomware Attacks