• All
  • Company
  • Industry
  • News
  • Partners
5 key ways to support your digital transformation to the cloud

by: Mike Contasti-Issac As we continue the discussion around cyber security awareness, we shift our focus to a popular topic, cloud security, digital transformation, and the challenges organizations may face while transitioning to cloud-based applications. Today, we’re identifying 5 points for organizations to focus on to successfully, and securely, migrate to the cloud. The only constant in the world of technology is change, and perhaps the biggest technological change that has occurred...

Read More
Securing Your Dynamic Cloud Strategy

Historically, the transition from older technology to new technology is pretty straightforward. While a handful of folks using an Underwood manual typewriter may have been reluctant to give them up, the majority of users were eager to switch to an electric model. Today, people line up around the block to turn in their barely broken-in smartphone for the latest model. Last year, IDG estimated that 96 percent of organizations had adopted the cloud...

Read More
What We Can Learn from the Capital One Hack

KrebsOnSecurity brings us an overview on what we can learn from the Capital One hack and information about the ongoing investigation. On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One. Since then, many have speculated the breach was perhaps the result of a previously unknown “zero-day” flaw, or an “insider” attack in which the accused took advantage of access surreptitiously...

Read More
Rethinking Security in Cloud Networking

Every CXO worries about security because the perimeter is changing; in fact, there are no walls for protection. The lines between cloud, workloads, applications, enterprise networks and hosts are blurring and the challenges are getting exponentially greater. The true security architect must rapidly address the reality of a more holistic network-wide security strategy. It must be one that goes beyond the cyber threat of the day to address the risk,...

Read More