by John Bruggeman | Dec 14, 2023 | Security
This episode of Inside the CISO’s Office explores some of the most significant developments in cybersecurity in 2023 to date, including the MGM Resorts breach, the MOVEit data breach, and the resulting updates to compliance rules from regulators. The 2023 cyber threat...
by John Bruggeman | Nov 9, 2023 | Security
Organizations that rely on legacy applications increasingly expose themselves to security threats. Legacy applications do not provide the security protections of cloud-first apps. In some sectors, risky legacy infrastructure holds back organizations from cloud...
by John Bruggeman | Oct 12, 2023 | Security
What is zero trust architecture, and why is implementing it essential to secure your organization’s data? We must first understand the traditional security architecture model to answer that question. The legacy “castle and moat” model is where you...
by Neal Marksberry | Sep 21, 2023 | Communications, Digital Workplace, Security
Unified Communications as a Service (UCaaS) solutions merge collaboration platforms like Cisco Webex Calling or Microsoft Teams Voice with cloud telephony. Based on these trends, it’s a safe bet that, eventually, most companies will utilize the benefits of UCaaS...
by Suman Jillella | Sep 7, 2023 | Security
Application modernization is critical to surmounting the vulnerabilities of legacy applications and systems. But app modernization efforts introduce their own set of security obstacles. Application modernization is both a boon and a hurdle to network and information...
by John Bruggeman | Aug 24, 2023 | Security
What exactly is zero trust architecture (ZTA)? In a nutshell, zero trust is a security philosophy based on replacing the outdated “castle-and-moat” cybersecurity model. The “hard on the outside, soft on the inside” approach to classical...