by Chris Munoz | Jan 9, 2024 | Blog, Cloud, Security
What is cloud security? “Cloud security” is a blanket term for the protocols, frameworks, and tools that protect cloud resources. This protection covers data, infrastructure, networks, applications, and end-user credentials. The need for properly implemented cloud...
by Keith Talbot | Dec 13, 2023 | Blog, Communications, Digital Workspace, Security
Ensure the safety of your organization customers with enhanced cybersecurity solutions and built-in contact center security tools from a security partner like CBTS. The transition to a hybrid work model has led to a revolution in the contact center world....
by Jon Lloyd | Dec 6, 2023 | Blog, Collaboration, Security
The modern digital landscape is ever evolving. This means that you don’t only need a robust approach to your security, but you must also be able to adapt it to dynamic networking environments. This is where SASE (secure access service edge) comes into play, offering a...
by John Bruggeman | Dec 4, 2023 | Blog, Security
In this episode of Inside the CISO’s Office, the hosts discuss the biggest cybersecurity highlights of 2023, including ransomware attacks on organizations like MGM Resorts, the MOVEit vulnerability that led to lawsuits, and the use of generative AI in phishing...
by David Leech | Nov 2, 2023 | Blog, Security
If you work in any form of information technology, you will have been bombarded with products that claim to deliver zero trust, with most zero trust vendors providing tools and capabilities that help secure end-user compute environments. What you may not be aware of...
by John Bruggeman | Oct 3, 2023 | Blog, Security
What exactly is zero trust, why should we care about it, and how does an organization implement it? The answer is simple. In today’s interconnected world, where companies store many of their assets outside of their organization, the traditional “castle and...
Recent Comments