A Look at a Zero Trust Strategy for the Remote Workforce

A Look at a Zero Trust Strategy for the Remote Workforce

If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to the credentials (ID and password)?” True enough, but in totality, the approach to managing access encompasses a broader spectrum of privacy policies. These policies include a mix of different strategies that can be applied based on an organization’s security vulnerabilities. Conditional access is…

Read More

How COVID-19 has made us rethink our IT teams | IT Governance

How COVID-19 has made us rethink our IT teams | IT Governance

As organisations start to consider life after COVID-19, they’ll realise that it’s not as simple as putting everything back the way it was in the Before Times. That ship has sailed. There have simply been too many benefits to remote working for organisations to demand a return to office life on a full-time basis. Indeed, a Gartner survey found that 47% of organisations will give employees the choice of working remotely full-time once the pandemic…

Read More

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Real-time locating systems as a security tool

Real-time locating systems as a security tool

Real-time locating systems as a security tool | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Special Meeting of Stockholders to Vote on Pending Acquisition by Thoma Bravo to be Scheduled for Later Date Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced its Board of Directors has cancelled the 2021 Annual Meeting of Stockholders scheduled for June 15, 2021. This follows the previously announced definitive agreement, pursuant to which Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, will acquire…

Read More

Uncovering hidden cybersecurity risks

Uncovering hidden cybersecurity risks

By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of the code. Yet, our process has not changed.  A week does not go by where we are not reading about a serious vulnerability in the news and subsequently scrambling to see if we are affected. This scramble, this mad dash, is a process we have…

Read More

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

By Don Boxley, Co-founder and CEO, DH2i When it comes to optimizing Microsoft SQL Server high availability (HA) and disaster recovery (DR), there’s a strong correlation between greater database transaction processing performance, business resiliency, and profitability—particularly for workloads like those in industries like financial services, though certainly other sectors as well. The fact is that our world is connected yet fragile, which creates many challenges when it comes to database HA/DR—specifically with resilience, security, and…

Read More

NetApp makes big hybrid-cloud push

NetApp makes big hybrid-cloud push

NetApp is making a major effort to support hybrid cloud with a batch of software announcements around storage products, converged infrastructure, and cloud-management services. The main news was the release of the latest version of its flagship ONTAP software, as well as updates to other products designed to help organizations build a better hybrid-cloud strategies. ONTAP is the operating system for NetApp’s FAS (hybrid flash-disk) and AFF (all-flash) storage arrays. The latest version, 9.9, adds…

Read More

Rescuing a Linux system from near disaster

Rescuing a Linux system from near disaster

The more you know about how Linux works, the better you’ll be able do some good troubleshooting when you run into a problem. In this post, we’re going to dive into a problem that a contact of mine, Chris Husted, recently ran into and what he did to determine what was happening on his system, stop the problem in its tracks, and make sure that it was never going to happen again. Disaster strikes It…

Read More
1 3,323 3,324 3,325 3,326 3,327 3,585