SASE hype includes SD-WAN, but does it need to?

One of the more popular cybersecurity trends in 2021 will undoubtedly be Secure Access Service Edge, or SASE. As enterprise networks evolve to better manage traffic from remote employees,... Read more »

5-step IaaS security checklist for cloud customers

Many organizations have almost completely replaced virtual data centers, on-premises servers and appliances with IaaS. This widespread implementation requires a mobilization to secure IaaS environments to match this increased... Read more »

Private vs. public cloud security: Benefits and drawbacks

Regardless of whether an enterprise’s infrastructure operates in a private, public or hybrid cloud, cybersecurity is a critical component. While some cloud architectures greatly simplify security tasks and tool... Read more »

How to create a cloud security policy, step by step

By Published: 21 Jan 2021 Organizations using cloud technology to support operations must follow good security practices. Establishing cloud security policies is key to achieving this. In short, a... Read more »

Select a customer IAM architecture to boost business, security

The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have timely access to the resources needed to complete their... Read more »

Extended detection and response tools take EDR to next level

Endpoint detection and response tools protect organizations’ endpoints by monitoring for suspicious behavior and collecting system activities and events. Many are equipped to automatically respond to threats, such as... Read more »

The human firewall’s role in a cybersecurity strategy

Businesses must prioritize cybersecurity now more than ever. This process requires a broader scope than investing heavily in security technologies, however — the tactic most companies have relied on... Read more »

Editor’s picks: Top cybersecurity articles of 2020

Many 2020 cybersecurity predictions were thrown out of orbit when coronavirus cases emerged and COVID-19 was declared a global pandemic by the World Health Organization in March. This year,... Read more »

Endpoint security quiz: Test your knowledge

Konstantin Emelyanov – Fotolia By Today’s security teams are under immense pressure, faced with having to secure the rapid, widespread adoption of IoT in the enterprise. Factor in the... Read more »

Surrounded by Stacks of Paper? How to Organize Your Important Documents

Share It’s hard to get any work done when you’re surrounded by papers on your desk, or even your countertops and tables. Whether they’re cluttered with newspapers, bills, or... Read more »
Subscribe to our Newsletter