Security Measures that Build Trust
It’s hard to predict all possible threats; however it is possible to proactively mitigate and manage the risk against these threats with intelligence and an advanced approach including following five key steps outlined in this post.
Posted by: Jai Arun on April 27th, 2015
Speed is everything when it comes to security. While the saturated security market makes it challenging for organizations to confidently know what next steps to take and what truly innovative security technologies and tools to depend on, now is the time to choose your partners wisely – and move.
Posted by: Stephen McCarney on April 10th, 2015
Attempts by the US government to control the level of encryption in products exported outside the United States by limiting the key length to 512 bits has resulted in one of the peskiest problems in IT – backward compatibility. How do you eliminate a feature, but not break already deployed equipment that expects to use it?
Posted by: Dave Frymier on March 10th, 2015
This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.
Posted by: Jeffrey Johnson on January 30th, 2015
It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.
Posted by: Premkrishnan Venkatasubramanian on November 14th, 2014
For the fifth and final week of National Cyber Security Awareness Month, we look at 4 tips for organizations to combat cybercrime.
Posted by: Roberto Tavano on October 30th, 2014
The primary objectives of identity and access governance are to manage risk and ensure compliance in a consistent, efficient and effective manner. Access governance is about implementing well-described processes, procedures, and guidelines.
Posted by: Charles Ugalde on October 27th, 2014
For week four of National Cyber Security Awareness Month, we look at 5 key security considerations for small and medium-sized companies in 2015.
Posted by: Francis Ofungwu on October 23rd, 2014
For week three of National Cyber Security Awareness Month, we're providing three tips for critical infrastructure protection.
Posted by: Stephen McCarney on October 15th, 2014
This week we’re continuing our series of tips aligned with the National Cyber Security Awareness Month campaign by looking at the secure development of IT products.
Posted by: Charles Ugalde on October 9th, 2014