Blog

How Edge Computing Will Drive New Demands for Data Security, Infrastructure Integrity and New IT Policies

How Edge Computing Will Drive New Demands for Data Security, Infrastructure Integrity and New IT Policies

With the explosive growth of Internet of Things (IoT) devices and the related massive data produced at the edge of the network, the centralized cloud computing model is running up against limitations associated with bandwidth, computing resources, and the latency often associated when processing is done in the cloud instead of locally.

Apr 26, 2019 Read More→
The Increasing Attack Surface in 2019

The Increasing Attack Surface in 2019

The “attack surface” is simply the total digital resources that are exposed to threats across the enterprise, and that attack surface is growing faster than ever before.

Apr 15, 2019 Read More→
In a Multi-Cloud World, It’s Time to Rethink Who Has Access To What

In a Multi-Cloud World, It’s Time to Rethink Who Has Access To What

The biggest challenge in today’s multi-cloud world is not storing data or supporting applications, but securing that data all along the “digital supply chain.”

Mar 28, 2019 Read More→
The First Major Breach Of 2019 And What This Australian Story Teaches Us

The First Major Breach Of 2019 And What This Australian Story Teaches Us

The first data breach this year happened January 1, when the private data of 30,000 Australian civil servants was stolen in an email phishing attack.

Mar 12, 2019 Read More→
Why Are Internal Threats Increasing? Five Questions to Ask…

Why Are Internal Threats Increasing? Five Questions to Ask…

A report published by Cyber-Security Insiders revealed eye-opening responses from CSOs, CIOs and other executives in global enterprises. In summary, their research (commissioned by CA Technologies) uncovered these five facts:

Mar 01, 2019 Read More→