Home > Support > Blog
Why Digital Transformation Is Putting Organizations at Risk

Why Digital Transformation Is Putting Organizations at Risk

In the rush to digital transformation, organizations are putting sensitive data at risk. Many are also struggling to implement proper data security as they embrace new technologies and multi-cloud deployments.

Monday, May 13, 2019/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (105)/Comments (0)/
Insider Threats: The Biggest Security Risk Organizations Face

Insider Threats: The Biggest Security Risk Organizations Face

It’s right to be concerned about the risk of a cyberattack launched by a shadowy hacker organization in Russia. However, the biggest threat to your computer systems and data could be sitting in a cubicle down the hall.
Wednesday, July 27, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1537)/Comments (0)/
Understanding the Critical Importance of Privileged Account Management

Understanding the Critical Importance of Privileged Account Management

In a recent survey by Thycotic and Cybersecurity ventures, 80 percent of organizations said privileged account management is a high priority, and 60 percent said that privileged account security is necessary to maintain compliance with government and industry regulations. In this post, we discuss seven steps to improve privileged account management.
Monday, July 25, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1459)/Comments (0)/
Tags:
9 Tips for Reducing the Risk of Ransomware

9 Tips for Reducing the Risk of Ransomware

Ransomware is a high-tech spin on the age-old art of the shakedown. Cybercriminals use malware to encrypt data on a victim’s systems, then demand a ransom to decrypt them. The crooks are betting on the fact that organizations rely heavily upon their data and will be willing to pay to regain access to the files.
Tuesday, July 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1924)/Comments (0)/
Is Your Next-Gen Firewall a Drag on Performance?

Is Your Next-Gen Firewall a Drag on Performance?

Firewalls have long been a foundational component of IT security strategies. Traditional firewalls can monitor ports and IP addresses, route packets and prevent certain types of network attacks. They basically guard the network perimeter.

Friday, June 03, 2016/Author: Mike Waters, VP, Product Architecture/Number of views (1650)/Comments (0)/
RSS
12