by Chris Munoz | Jan 11, 2024 | Blog, Cloud, Security
Aiming for zero trust A key driver of cloud security strategy is the move toward zero trust. Zero trust is a framework that guides how networks handle user traffic, devices, and requests by assuming all network operations are malicious until proven benevolent with...
by Chris Munoz | Jan 9, 2024 | Blog, Cloud, Security
What is cloud security? “Cloud security” is a blanket term for the protocols, frameworks, and tools that protect cloud resources. This protection covers data, infrastructure, networks, applications, and end-user credentials. The need for properly implemented cloud...
by Keith Talbot | Dec 13, 2023 | Blog, Communications, Digital Workspace, Security
Ensure the safety of your organization customers with enhanced cybersecurity solutions and built-in contact center security tools from a security partner like CBTS. The transition to a hybrid work model has led to a revolution in the contact center world....
by Jon Lloyd | Dec 6, 2023 | Blog, Collaboration, Security
The modern digital landscape is ever evolving. This means that you don’t only need a robust approach to your security, but you must also be able to adapt it to dynamic networking environments. This is where SASE (secure access service edge) comes into play, offering a...
by John Bruggeman | Dec 4, 2023 | Blog, Security
In this episode of Inside the CISO’s Office, the hosts discuss the biggest cybersecurity highlights of 2023, including ransomware attacks on organizations like MGM Resorts, the MOVEit vulnerability that led to lawsuits, and the use of generative AI in phishing...
by Jana Korfhagen | Nov 30, 2023 | Blog, Security
In part one of our discussion on incident response tabletop exercises, we outlined the value of using gaming for identifying and shoring up weaknesses in a company’s cybersecurity infrastructure. In this second part, we’ll run through an actual incident response...
Recent Comments