by Chris Munoz | Jan 9, 2024 | Blog, Cloud, Security
What is cloud security? “Cloud security” is a blanket term for the protocols, frameworks, and tools that protect cloud resources. This protection covers data, infrastructure, networks, applications, and end-user credentials. The need for properly implemented cloud...
by Keith Talbot | Dec 13, 2023 | Blog, Communications, Digital Workspace, Security
Ensure the safety of your organization customers with enhanced cybersecurity solutions and built-in contact center security tools from a security partner like CBTS. The transition to a hybrid work model has led to a revolution in the contact center world....
by Jon Lloyd | Dec 6, 2023 | Blog, Collaboration, Security
The modern digital landscape is ever evolving. This means that you don’t only need a robust approach to your security, but you must also be able to adapt it to dynamic networking environments. This is where SASE (secure access service edge) comes into play, offering a...
by John Bruggeman | Dec 4, 2023 | Blog, Security
In this episode of Inside the CISO’s Office, the hosts discuss the biggest cybersecurity highlights of 2023, including ransomware attacks on organizations like MGM Resorts, the MOVEit vulnerability that led to lawsuits, and the use of generative AI in phishing...
by Jana Korfhagen | Nov 30, 2023 | Blog, Security
In part one of our discussion on incident response tabletop exercises, we outlined the value of using gaming for identifying and shoring up weaknesses in a company’s cybersecurity infrastructure. In this second part, we’ll run through an actual incident response...
by Jana Korfhagen | Nov 28, 2023 | Blog, Security
When the Cybersecurity and Infrastructure Security Agency (CISA) conducted a cybersecurity assessment across multiple organizations, they found that eight out of ten fell victim to simulated phishing attempts. Ten percent of organizations even clicked on malicious...
Recent Comments