blank

Leading Archives

Dark Data

Securing Your Plugins, Themes, and Services

Securing Your Plugins, Themes, and Services Continued from part 1 of our 2 part WordPress security series. For web scribblers who use WordPress, security should ...
Photo By David Marcu

The Path of Technology is Paved With New Collaboration Strategies 

Collaboration Strategies Cloud computing ushers in a new age of collaboration, one that allows an organization to excel at sharing data and strategies seamlessly and ...
Ibm Logo

Data Science: Influencers share their predictions

Data science was one of the hot topics of 2018, and it’s likely to dominate again in 2019. The IBM Big Data and Analytics Hub asked five ...
Anurag Kahol Bitglass

Four Trends Driving Demand For Data Security

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to ...
Quantum

Data Breaches and the Necessity of Top Tier Security

Top Tier Security Importance In just a few years, information technology has quickly evolved into an indispensable and central part of our lives. Both personally ...
Comic Att

SECURITY RESOURCE HUB

Elevating tech security to new heights!

Cloud security news, resources, thought leadership and infographics covering topics such DDoS, Ransomware, Privacy Breaches, cybersecurity certification and more...

THOUGHT LEADERSHIP

Juan Pablo Perez Etchegoyen

69% of Enterprises are Moving Mission-Critical Information to the Cloud

By Juan Pablo Perez-Etchegoyen | June 30, 2020

Why Security matters According to a research study by the Cloud Security Alliance (CSA), 69% of enterprises are moving mission-critical information to the cloud. These migrations are massively complex and take meticulous planning to ensure success. At the same time,

David Balaban

Ransomware – Cybercriminal Groups Know The Weak Points

By David Balaban | June 24, 2020

Cybercriminal Groups Grow Data breaches and leaks represent a quickly growing security problem these days. When plenty of people work from home, the risk of data leaks is much higher. Cybercriminal groups know the weak points and pay increased attention

Daniela Streng

Preventing IT Outages and Downtime

By Daniela Streng | June 23, 2020

Preventing IT Outages As businesses continue to embrace digital transformation, availability has become a company’s most valuable commodity. Availability refers to the state of when an organization’s IT infrastructure, which is critical to operating a successful business, is functioning properly.

Patrick Joggerst

Living on the Edge: The New Real-Time Communications Security Risks

By Patrick Joggerst | June 9, 2020

Real-time communications Security Risks As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed teams to continue to get

Kaylamatthews

New Security Regulation – Cybersecurity Maturity Model Certification (CMMC)

By Kayla Matthews | June 3, 2020

Cybersecurity Maturity Model Certification Changes are on the horizon for the Department of Defense (DoD) and its contractors. Late last year, the DoD announced the Cybersecurity Maturity Model Certification (CMMC), which officially released in January. The second phase of CMMC regulations