By Jayne Hallock
Our new 12 page eBook is a great way to identify any gaps in your enterprise’s cybersecurity armor. Find out if your staff is making the “1, 2, 3, 4, Open Door” mistake and learn what is involved in 80% of security breaches… Jayne HallockWith almost 20 years of writing and editing under her belt […]
By Jayne Hallock
Cybersecurity, Identities, People & Process: A Crucial Integration for the Modern Identity SOC One area of cybersecurity that’s often overlooked – or treated as an afterthought – is identity security. This could be a costly mistake. More specifically, traditional network edge tools can’t protect you anymore as workloads and company data exist on-premise and in the […]
By Jayne Hallock
Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]
By Jayne Hallock
The recent Equifax breach is one of the largest and most stunning breaches we’ve seen. Although cybersecurity is a complex and completely unpredictable topic, we thought we should weigh in on the basic facts and provide our readers a curated list of interesting, informed further research. First, some facts. According to the FTC, the “The breach […]
By Jayne Hallock
Security threats are everywhere. Yes, even to companies with the best firewalls and intrusion prevention systems. That’s because no matter how much your data security guards against breaches, your greatest vulnerability lies within your perimeter. It lies with your people. Insider threats are a rising concern for data and cloud security, and for good reason. […]