Earlier this year multiple European governments and media agencies were given a stark reminder of the pervasive cybersecurity threats that exist in a world without traditional network perimeters. The Zimbra webmail zero-day attacks sent organizations scrambling to contain the damage when a cadre of suspected Chinese hackers infiltrated these organizations’ systems in an attempt to […]
Why Zero Trust and XDR Are the Future of Data Security
Zero trust is a data security model that aims to protect networks against all devices and users. The model assumes that any device and user can be compromised at any time, and therefore should not be trusted even if they were previously authenticated. Traditional data security approaches use firewalls and virtual private networks (VPNs) to […]
Information Management Trends Arming Organizations for Resilience in 2022
If the last year has taught us anything, it’s that the only thing we can certainly predict for 2022 is uncertainty. Businesses are still recovering from the effects of the pandemic and learning to adapt to this work-from-anywhere world. As business leaders recognize that preparing for continuous change can no longer take a backseat, responsiveness […]
A New Era of Risk: Data Security Through Modern Authentication Technologies
IT professionals are still struggling to manage the risks brought about by remote work with their existing data security tools. Remote access went from being considered a workplace exception to the default model for large swaths of employees seemingly overnight. However, the considerable strain remote access puts on information security environments continues to be felt. […]
Are VPNs Safe? It’s Complicated
October is Cybersecurity Awareness Month! All month long, we’ll be exploring cybersecurity-related topics to help you (and your data) stay safe online. Click to learn more about author Francis Dinha. Like clockwork, it seems as though every time you check the news you see a story about a major hack of an organization’s VPN. Colonial […]
The Transition to Remote Work Makes Zero Trust More Important Than Ever
Click to learn more about author Rajesh Ganesan. The current corporate landscape is populated by remote workers, many of whom are using non-sanctioned devices to access corporate applications and services. This transition to remote work is placing many companies at risk. According to the 2021 Digital Readiness Survey, 83% of information technology professionals say that the recent […]
A Look Ahead: What Pros Need to Know About Cybersecurity in 2021
Click to learn more about author Jerry Ray. You can feel it – constrained optimism bubbling up throughout those communities fortunate enough to enjoy a vaccinated majority. You can see it – daily images of crowded airports and erratic phone videos of passionate passengers aching to stretch out. You can taste it – masks on […]
The Solution to Overcoming Cyber Threats in a 5G World and Beyond
Click to learn more about author Michael Abad-Santos. As 5G networks continue to roll out worldwide, the looming question of how we can overcome cyber threats continues to elude even the experts. In fact, it is for this very reason the National Security Agency (NSA) released unclassified 5G security guidance, which includes Potential Threat Vectors to 5G […]
Cybersecurity Isn’t Going Anywhere in 2021: Expert Predictions Part Two
Click to learn more about author Samantha Humphries. As stated in part one of our 2021 cybersecurity predictions series, businesses rapidly moved much of their workforces online, and the threatscape grew, creating new opportunities for cybercrime. Most organizations — out of necessity — reduced security standards to quickly meet the demands of a newly remote […]
2021 Predictions: Data Mobility Will Drive a New Cloud Paradigm
Click to learn more about author Steve Costigan. As we begin to think about shifting to a post-COVID-19 world, many businesses will enter a new dynamic in which digital transformation is accelerated. New applications will emerge, and IT will be central to this by enabling more instant access and portability of systems. The increased mobility […]