Tags

Security

Locking Down the Endpoint

The most common second step of any security breach is the exploit of a security vulnerability in a platform or application. Today, that includes not just PCs and Mac, but a whole host of mobile devices, and all the systems sitting in our datacenters, the cloud, and the Internet at large.

Read More…

Moats, Walls, Threats, Networks

Who’s in your network? The adversaries are already past the gate. One third of US companies were breached in 2016, and even more don’t yet know that they have already been breached. The amount of time-to-discover that a breach has happened is measured in weeks and months when the time-to-compromise defenses is measured in minutes. The moats and walls of yesteryear aren’t keeping us safe from the adversary anymore.

Read More…

Identity is the New Perimeter

Today, security across many of those connections relies on contracts, SLAs, and other partner agreements. The last chance that we have to exert a strong control to secure our employee access is often with Identity, Authentication and Authorization.

Read More…

Securing Your Data

Where is your treasure kept? For the vast majority of organizations, at least a part of that treasure is made up of data: customer privacy data, credit card information, electronic health records, confidential intellectual property, all of these are examples of data that has a cash value on the black market.

Read More…