by Ryan Hamrick | Feb 20, 2024 | Blog, Security
When we talk with clients about our services and we review our services catalog, we often hear these questions: “What’s a vulnerability assessment?” “What do you do during a penetration test?” “Do you perform a vulnerability assessment during a penetration test?” “Why...
by Justin Rice | Feb 15, 2024 | Blog, Q&A, Security
In this CBTS Tech Talk episode, hosts Lance Hart, Justin Rice, and Jon Lloyd discuss the real benefits of secure access service edge (SASE) as well as the hype surrounding it and its integration with zero trust. What is SASE, and why all the hype? Secure access...
by Chris Munoz | Feb 13, 2024 | Blog, Cloud, Security
What is cloud security? A recent study found that the global cloud services market is valued at $454 billion and is expected to surpass $2 trillion by 2032. As businesses continue to shift toward cloud integration, security becomes more and more urgent. Even though...
by Jana Korfhagen | Feb 1, 2024 | Blog, Security
What will a post-quantum computing landscape mean for digital security? Securing the future is going to be more challenging with quantum computing presenting risks that many organizations are not prepared to address. This emerging risk was the topic of our recent...
by Kevin Johnston | Jan 23, 2024 | Blog, Security
What are zero trust and SASE? As users increasingly adopt hybrid or fully remote work models and IT environments become more distributed, securing data only becomes more complicated. The traditional data-centric security approach falls short in distributed...
by Chris Munoz | Jan 11, 2024 | Blog, Cloud, Security
Aiming for zero trust A key driver of cloud security strategy is the move toward zero trust. Zero trust is a framework that guides how networks handle user traffic, devices, and requests by assuming all network operations are malicious until proven benevolent with...
Recent Comments