Home > Support > Blog
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (505)/Comments (0)/
Categories: Security Services
Why You Need Managed Services with the Cloud

Why You Need Managed Services with the Cloud

In our last post, we discussed the critical importance of developing a strategy before moving to the cloud. Adopting cloud services without defining the business drivers and desired outcomes is a recipe for disaster. Your cloud strategy will help you select the right applications and services, understand all the costs involved, and ensure that security is baked in from the start.

Tuesday, August 15, 2017/Author: The SageNet Team/Number of views (883)/Comments (0)/
How Edge Computing Makes the IoT More Efficient and Secure

How Edge Computing Makes the IoT More Efficient and Secure

In several recent posts, we talked about the challenges associated with securing growing numbers of cloud applications and services. We discussed the shared responsibility model of the cloud and steps organizations should take to overcome the security threats associated with rogue clouds.

Tuesday, August 08, 2017/Author: The SageNet Team/Number of views (904)/Comments (0)/
Categories: Security Services
Creating the ‘Invisible Infrastructure’ with a Software-Defined Perimeter

Creating the ‘Invisible Infrastructure’ with a Software-Defined Perimeter

Numerous surveys reflect a growing reliance on cloud services, with organizations moving a broad range of applications and workloads to the cloud. No surprise there — after all, the cloud model has demonstrated a fantastic ability to facilitate simple, powerful and affordable solutions that resolve significant business challenges and deliver peace of mind.

 

Friday, September 16, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1607)/Comments (0)/
Categories: Security Services
RSS