How Multi-Cloud Environments Expand Your Attack Surface and How to Manage and Reduce the Risk

Multi-Cloud Environments Expand Your Attack Surface

In a highly connected world, businesses of all sizes are picking up the pace on adopting multi-cloud environments from cloud-based services to infrastructure. The benefits are indisputable: A richer and more versatile set of cloud options, enhanced redundancy, and a superior security/cost value from multi-cloud environments. But using hybrid cloud environments expands the attack surface […]

10 Factors for Cloud Security During Selection and Implementation

Cloud Security During Selection and Implementation

In the not-so-distant past, IT security was based on perimeter protections surrounding racks of on-premises servers. There was a clear distinction between inside versus outside, and it was theoretically possible to admit only authorized users and connections. Today, the internet, smart devices and cloud services are changing the way we do business and offer undeniable […]

The Importance of Identity Management and Governance for Telework Security

Identity Management and Governance for Telework Security

During the COVID-19 pandemic, organizations’ switch to a remote workforce has, in many cases, left employees working from home without the tools or training required to protect the organization. This served to highlight the need for identity management and governance for telework security. While enforcing the use of a virtual private network (VPN) when working […]

Achieve Secure Cloud Adoption Using HITRUST

Using HITRUST for Secure Cloud Adoption

Most security teams are accustomed to operating in an environment where they have a high level of access to and control over their network infrastructure. In an on-premises data center, the organization owns and controls their own infrastructure, making it relatively easy to implement required security controls, perform audits, and achieve and maintain regulatory compliance. […]

Stop! Using Online Collaboration Tools Until You Read This

Online collaboration tool security

The COVID-19 pandemic has caused many organizations to abruptly adopt a remote work policy for most or all their staff. One impact of this transition is a spike in the use of online collaboration and videoconferencing tools such as Zoom, LogMeIn GoToMeeting, Cisco WebEx, and Microsoft Teams. Cybercriminals Are Targeting Online Collaboration Platforms The sudden […]

Security Implications of the Internet of Things

Devices connected to the Internet of Things (IoT) add substantial value to businesses and industries such as manufacturing, transportation, and utilities among others according to a recent Tech Pro Research Survey. By automating tasks and making functionality easily accessible to the average user, many devices, like Internet-enabled security cameras and medical devices, have the potential […]

Implementing Defense in Depth in the Cloud

Many companies assume their cloud vendor is responsible for and has adequate tools, policies and procedures in place for protecting the data with which they are entrusted. While this is true to some extent, consumer data protection laws such as GDPR hold the owner of the data responsible if the cloud service is compromised. “Using […]