Blog
SOAPA vs. SOAR: How these security terms differ
September 13, 2019
0 Comment
By Jon Oltsik
SOAPA and SOAR look the same, but the terms are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA). I came up with the security operations and analytics platform architecture (SOAPA) concept in late 2016. As a review,
Balancing innovation and security in digital transformation
September 12, 2019
0 Comment
By Stuart Reed
Businesses everywhere are undergoing digital transformation. Widespread adoption of mobile and cloud platforms, along with recent advances in technologies such as AI, blockchain and quantum computing are reshaping how we work. But the increased opportunities these developments represent are accompanied by a growing number of threats to our security. In
Dual-defense strategy for network security
September 12, 2019
0 Comment
By MICHAEL MURRAY
Recent headlines about ransomware attacks have elevated the urgency for public entities to implement effective measures to prevent cybersecurity breaches and avoid becoming the next news story. Government agencies, however, face unique challenges. They are often coping with limited technology budgets, poor cyber hygiene (including outdated and unpatched systems), a
Flipping a coin on cybersecurity?
September 12, 2019
0 Comment
By PAUL STAFFORD
Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you’re able to prevent – or recover from – a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business productivity and reputational losses — not to mention struggle to recover
Protect Your Enterprise by Setting Standards for Mobile Security
September 11, 2019
0 Comment
By Matthew Montgomery
Policy enforcement, deployment, updated and most importantly, standards, are all vital components of a mobile device security strategy.The year 2019 has been a banner year in the world of cybersecurity, with thousands of high-profile compromises impacting organizations across all sectors – from education, to financial services, to healthcare, to the