by John Bruggeman | Jan 23, 2024 | Security
Zero trust is a strategic framework every company can strive to implement that will strengthen enterprise security systems. The basics of zero trust are foundational and vital to the continued defense of your digital estate. A crucial part of a successful...
by John Bruggeman | Dec 14, 2023 | Security
This episode of Inside the CISO’s Office explores some of the most significant developments in cybersecurity in 2023 to date, including the MGM Resorts breach, the MOVEit data breach, and the resulting updates to compliance rules from regulators. The 2023 cyber threat...
by John Bruggeman | Nov 9, 2023 | Security
Organizations that rely on legacy applications increasingly expose themselves to security threats. Legacy applications do not provide the security protections of cloud-first apps. In some sectors, risky legacy infrastructure holds back organizations from cloud...
by John Bruggeman | Oct 12, 2023 | Security
What is zero trust architecture, and why is implementing it essential to secure your organization’s data? We must first understand the traditional security architecture model to answer that question. The legacy “castle and moat” model is where you...
by Neal Marksberry | Sep 21, 2023 | Communications, Digital Workplace, Security
Unified Communications as a Service (UCaaS) solutions merge collaboration platforms like Cisco Webex Calling or Microsoft Teams Voice with cloud telephony. Based on these trends, it’s a safe bet that, eventually, most companies will utilize the benefits of UCaaS...
by Suman Jillella | Sep 7, 2023 | Security
Application modernization is critical to surmounting the vulnerabilities of legacy applications and systems. But app modernization efforts introduce their own set of security obstacles. Application modernization is both a boon and a hurdle to network and information...