April 14, 2021 | Bob Covello

Phishing towards failed trust

This blog was written by an independent guest blogger. Phishing exercises are an important tool towards promoting security awareness in an organization.  Phishing is effective, simply because it works.  However, any social engineer can devise a marvelously deceptive message with an irresistible link that only the most tech-savvy person would spot as a phishing test.  Sometimes, the…

April 13, 2021 | Ziv Hagbi

Advanced mobile protection through the AlienApp for MobileIron

Companies of all sizes need clear and cohesive security visibility over every aspect of their organization. As data and assets are trending to mobile, it’s critical to be equipped with the right tools to gain insights on mobile devices and users on the endpoints and mitigate threats whenever needed. Collecting threat data from mobile devices and discovering mobile…

Get the latest security news in your inbox.

Subscribe via email

RSS

April 9, 2021 | Mark Stone

What is a cybersecurity strategy and how can your business develop one?

This article was written by an independent guest author The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated…

April 9, 2021 | Derrick Johnson

The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE?  My answer is almost always the same: Nothing….and, everything.  Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both…

April 7, 2021 | Tawnya Lancaster

Do customers really care about SASE? Absolutely, and here’s why

As IT and security leaders adapt to business operations in the “new normal,” they are simultaneously being charged with priming the business to win in the next era of distributed computing. This involves myriad updates to the business’ IT systems, and in some cases, a comprehensive overhaul for network modernization, cloud migration, and edge design and deployment …

April 6, 2021 | Irfan Shakeel

Use AI to fight AI-powered cyber-attacks

This blog was written by an independent guest blogger "AI is likely to be either the best or worst thing to happen to humanity.” ~Stephen Hawking Cyber-attacks are commonly viewed as one of the most severe risks to worldwide security. Cyber-attacks are not the same as they were five years back in aspects of availability and efficiency. Improved technology…

April 2, 2021 | Bernard Brode

5 steps to respond to a data breach

This blog was written by an independent guest blogger. You’ve just been breached. What do you do next? Depending on personality, preparation, and ability under crisis, there are a variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this…

April 1, 2021 | Lisa Ashjian

Endpoint Security: Helping to realize the benefits of SASE

Endpoint security is at the forefront of digital transformation due to the very nature of needing to protect devices outside the company’s network perimeter. This started with traditional devices such as laptops and desktops.  Endpoint security then quickly expanded to include mobile security, for smartphones and tablets. And, as more data moved to the cloud endpoint security…

March 30, 2021 | Nahla Davies

What educational institutions need to do to protect themselves from cyber threats

This blog was written by an independent guest blogger. Educational institutions are reaping the many benefits and new possibilities offered by online learning, but these new methods of educational instruction come with serious cyber security concerns. These institutions are also a prime focus for hackers because they often host a lot of sensitive data about teachers and students.  Furthermore,…

March 29, 2021 | Theodoros Karasavvas

Adaptive cybersecurity: 3 strategies that are needed in an evolving security landscape

This blog was written by an independent guest blogger. Cybersecurity is no longer an outlandish concept to many business enterprise executives. What is still relatively unfamiliar to many organizations and their leadership, however, is the task of evaluating their cyber strategy and risk to determine how best to adapt and grow to stay secure while remaining competitive.  Executives must…

March 26, 2021 | Mark Stone

SD-WAN vs. MPLS: how do they compare from a security perspective?

This article was written by an independent guest author. SD-WAN and MPLS are two technologies that are often perceived as either-or solutions. For many organizations, however, SD-WAN and MPLS can complement each other. This article will define and compare the technologies, explaining how, in many cases, they work together. We’ll also explore SD-WAN’s popularity and its…

March 25, 2021 | Carisa Brockman

Cybersecurity strategy…. To Plan or not to plan…That is the question

What is a strategy?  As defined by Merriam Webster…. ‘a carefully developed plan or method for achieving a goal or the skill in developing and undertaking such a plan or method.’  A cybersecurity strategy is extremely important, but many organizations lack a strategy, or they have not kept their strategy and subsequent roadmap current. …