by Kevin Johnston | Feb 6, 2024 | Security
What is SASE and zero trust? Securing sensitive data becomes increasingly complicated as hybrid and fully remote environments become prevalent. Traditional security models fail in distributed IT environments, where every network-connected device represents a potential...
by Sean Leinen | Jan 30, 2024 | Security
Security assessments and penetration testing are well-established tools for staving off risk. But even when an IT security team believes they have SecOps handled, a merger or acquisition (M&A) introduces unknown variables. M&As are often a monkey wrench thrown...
by John Bruggeman | Jan 23, 2024 | Security
Zero trust is a strategic framework every company can strive to implement that will strengthen enterprise security systems. The basics of zero trust are foundational and vital to the continued defense of your digital estate. A crucial part of a successful...
by John Bruggeman | Dec 14, 2023 | Security
This episode of Inside the CISO’s Office explores some of the most significant developments in cybersecurity in 2023 to date, including the MGM Resorts breach, the MOVEit data breach, and the resulting updates to compliance rules from regulators. The 2023 cyber threat...
by John Bruggeman | Nov 9, 2023 | Security
Organizations that rely on legacy applications increasingly expose themselves to security threats. Legacy applications do not provide the security protections of cloud-first apps. In some sectors, risky legacy infrastructure holds back organizations from cloud...
by John Bruggeman | Oct 12, 2023 | Security
What is zero trust architecture, and why is implementing it essential to secure your organization’s data? We must first understand the traditional security architecture model to answer that question. The legacy “castle and moat” model is where you...