12 March, 2020 | Ilia Sotnikov

The Cloud Security Risk of Remote Workers, and How to Stop It

Telecommuting has been on the rise for over a decade. According to research from Global Workplace Analytics and FlexJobs, the number of people working remotely in the U.S. increased by 159% between 2005 and 2017, and then increased again by 22% between 2017 and 2018. A flexible workplace offers...
10 March, 2020 | Simon Fernand

A Vision for Strong Cybersecurity

The current state of cybersecurity The number and severity of cybersecurity threats is increasing daily. At the same time, the world is experiencing a severe and growing shortage of skilled IT security professionals. According to the 2019 (ISC)² Cybersecurity Workforce Study, the skills gap has...
20 February, 2020 | Ryan Brooks

Getting Started with Database Security

As a database administrator (DBA), you need a solid grasp of database security basics to manage your systems confidently. Having strong database security knowledge will allow you to protect your organization’s sensitive and business-critical information by following best practices and ensuring...
13 February, 2020 | Ryan Brooks

Data Security Management: Where to Start

Data security has become even more complicated with today’s hybrid environments. Coordinated security management is essential to a range of critical tasks, including ensuring that each user has exactly the right access to data and applications, and that no sensitive data is overexposed. This...
6 February, 2020 | Ryan Brooks

Must-Have Data Security Controls

The average cost of a data breach has risen to nearly $4 million worldwide and $8.2 million in the U.S. Multiply that number across the thousands of breaches that occur in a given year, and it becomes clear why organizations are reconsidering their data security controls. The good news is that...
2 January, 2020 | Ryan Brooks

Data Security Basics and Data Protection Essentials

Data is the most valuable corporate asset for any business. No matter what industry you are in, it’s critical to take care of your data, whether it is financial reports and healthcare records, or a start-up business plan. In this article, we are going back to the most important data security...
17 December, 2019 | Ryan Brooks

The Shift to Data-Centric Security

Traditionally, data protection has focused on securing the perimeter — trying to keep intruders out of systems and networks where sensitive data is stored. But with the rise in cloud computing, sensitive data can transit through or be stored in systems that are outside the traditional perimeter....
3 December, 2019 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
Show more articles
...