Premium Government Content
-
Will Your Virtual Data Traffic Take The Detour Around Your Firewalls?
11/1/2016
We’re soon going to need a new descriptor going forward when we refer to the data center. This rings true because network virtualization across private and public environments means the locations of compute and storage resources to facilitate on-demand networking do not sit statically in what could be considered a typical data center anymore. Virtual workloads now dart around like bees in a field of clover. It’s no longer a question or if but when all of this will affect your network.
-
How To Help Clients Protect Their Data From Ransomware Attacks (Hint: They Need More Than Anti-Malware)
10/13/2016
Want to provide your clients with a solution that can help them protect their most valuable investment — their sensitive data — while generating a major new revenue stream? Read on. By Gary Watson, Vice President Technical Engagement, Nexsan
-
What To Examine When Considering Cyber Insurance
10/10/2016
Robert Mueller, the former head of the FBI, is quoted as saying, “There are only two types of companies — those that have been hacked and those that will be.” By Christopher Camejo, Director of Threat and Vulnerability Analysis, NTT Security
-
Access Governance And The Cloud: The Reasons Why
9/26/2016
Access governance continues its climb toward becoming a dominant force in a growing market in a plethora of industries throughout the U.S. and beyond. Organizations now more than ever investing resources in access governance solutions so they can improve process efficiency and the security of their networks without much effort. By Dean Wiech, managing director, Tools4ever
-
Apple Upgrades And The Enterprise
9/6/2016
In advance of Apple’s upcoming press conference on September 7th, it’s a good time to take a look at recent announcements the company has made that are directly impacting the enterprise. Apple has been making clear and vocal shifts to increase its enterprise business over the past two years. The company now has partnerships with major enterprise players, including IBM (July 2014), Cisco (September 2015), and now SAP (May 2016). Not only do these partnerships strengthen Apple’s enterprise position, they also give the company access to hundreds of millions of potential enterprise customers.
-
Warning: What You Need To Know About Malware
7/14/2016
Most people think if they have a firewall and some kind of anti-virus program they are good, thumbs up, no need to worry about all that cyber stuff. Unfortunately, it is this kind of thinking that makes cyber criminals so wealthy and the rate of cybercrime go up. By David Nathans, director of security, SOCSoter
-
10 Ways To Create And Retain Engagement With Process Improvement
7/13/2016
Is your business struggling to get staff involved in process improvement initiatives? If so, you can take solace in knowing you’re not alone. By Ivan Seselj, CEO, Promapp
-
Applying Machine Learning To Identify Compromised Credentials
7/8/2016
It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.
-
The Best Management Advice I Ever Received
7/7/2016
When I first started managing, I thought a lot about myself: how I was doing with my team, how I didn’t want to be a terrible manager, things I could do to become a great manager. Yet when I first started out, the advice I got was “it’s not about you anymore.”
-
Strategies Bosses Use To Avoid Apologizing
7/6/2016
Where in the world is the school where managers study apology avoidance. It always surprises me when perpetrator-like managers have already built an impressive array of personal apology avoidance habits and language. They don’t get this from their mothers, I know that. I also know those who ignore their mom’s advice deserve what they get.