Innovative security tools at 2019 RSA Conference

Innovative security tools at 2019 RSA Conference

This year’s RSA Conference (RSAC) was bigger than ever – and I don’t mean that in the rote sense of “more exciting! Action packed! Full of more interesting things to see and learn!” I mean it literally – the physical space used by the conference that promises to...
Create your data breach response plan

Create your data breach response plan

Every so often, we get a panicked call from a client that is experiencing an information security breach. The client may have a rampant outbreak of ransomware, a defaced website, or worse … a complaint about lost or stolen data. The client needs to understand...
Cloud helps schools secure data infrastructure

Cloud helps schools secure data infrastructure

Today’s educational industry, both in the public and private sector, face a number of unique challenges when it comes to provisioning and securing data infrastructure. Educational institutions are continuously confronted with the same explosion of data and mounting...
Continuous Penetration Testing critical for security

Continuous Penetration Testing critical for security

The rise of sophisticated new hacking tools has presented the modern enterprise with unpredictable and unprecedented security risks. While major attacks from highly sophisticated and sometimes even state-sponsored actors and organized cyber criminals garner most of...
Innovative security tools at 2019 RSA Conference

Backups vital part of Cybersecurity plan

“We’re very sorry, but your data has been lost.” “We’re very sorry, but your data has been compromised.” These are words that no CEO, CFO, or manager wants to tell his or her clients, and for good reason. Compromised or lost data devastates businesses because it...