by Jana Korfhagen | Nov 30, 2023 | Blog, Security
In part one of our discussion on incident response tabletop exercises, we outlined the value of using gaming for identifying and shoring up weaknesses in a company’s cybersecurity infrastructure. In this second part, we’ll run through an actual incident response...
by Jana Korfhagen | Nov 28, 2023 | Blog, Security
When the Cybersecurity and Infrastructure Security Agency (CISA) conducted a cybersecurity assessment across multiple organizations, they found that eight out of ten fell victim to simulated phishing attempts. Ten percent of organizations even clicked on malicious...
by David Leech | Nov 2, 2023 | Blog, Security
If you work in any form of information technology, you will have been bombarded with products that claim to deliver zero trust, with most zero trust vendors providing tools and capabilities that help secure end-user compute environments. What you may not be aware of...
by John Bruggeman | Oct 3, 2023 | Blog, Security
What exactly is zero trust, why should we care about it, and how does an organization implement it? The answer is simple. In today’s interconnected world, where companies store many of their assets outside of their organization, the traditional “castle and...
by John Bruggeman | Sep 20, 2023 | Blog, Security
Application modernization helps organizations overcome the vulnerabilities of legacy software. But app modernization presents its own set of security challenges. Network security is a double-edged sword in application modernization (updating legacy apps to run...
by John Bruggeman | Sep 13, 2023 | Blog, Security
If you are looking to build stronger cybersecurity into your business network, where does enterprise data security rank on your to-do list? Zero trust can help with that. It is one of the most fundamental yet most crucial steps you can take to protect your enterprise....
Recent Comments