Blog
Rapid Cloud Adoption Introduces Security Risks
December 20, 2019
0 Comment
By Lior Cohen
Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that relies on an assortment of cloud platforms and services—especially when they all take different approaches to security and
How to Completely Secure Your Samsung Mobile Device
December 20, 2019
0 Comment
By SM Picks
Samsung mobile devices need to be protected against the many cyber security threats that exist today. These Android-based smartphones and tablets can be compromised in several ways, whether through malicious action on the part of hackers or unintentional consequences due to user error. This guide provides a comprehensive list of
Why 5G harbors multiple security weaknesses
December 19, 2019
0 Comment
By Lance Whitney
5G is being touted by many as the latest and greatest wireless technology with faster speeds and lower latency than its predecessors and the ability to juggle multiple devices, including Internet of Things (IoT) hardware and other demanding items. But concerns have arisen in some circles, including the European Union,
5 security operations and analytics trends to watch in 2020
December 19, 2019
0 Comment
By Jon Oltsik
According to ESG research, 36% of organizations are actively integrating disparate security analytics and operations tools in pursuit of a more cohesive security technology architecture (note: I am an ESG employee). Another 48% of organizations say they are somewhat active with security analytics and operations tool integration. This data describes
The Three Cyber Attacks Ruining Your Holiday Spirit
December 19, 2019
0 Comment
By Karen Bowen
By Karen Bowen The retail industry isn’t the only one that needs to worry about cyber attacks. In fact, all organizations are warned against increased threats due to careless employee behaviors during the holiday season. In a recent survey, half of the participants admitted to using a work-issued computer or mobile