What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?

Trying to understand what network security solutions are available, the differences between them, how and when they should be used, can be overwhelming for most organizations. While there are many options to choose from, a typical suite of tools would include an Intrusion Prevention System (IPS), Data Loss Prevention (DLP) software/hardware, and a sophisticated Data-Centric Audit & Protection … [Read more...]

How to Overcome Barriers that Lead to AI Failure

At this week’s AI Summit, AI leaders from IBM and Google examined the factors that contribute to AI failure and shared best practices for getting past those obstacles.Business leaders see tremendous competitive advantage in artificial intelligence, due to the promise it holds to greatly improve customer satisfaction, retention and loyalty; increase revenues; and save money. Yet, only five percent … [Read more...]

Mac malware combines EmPyre backdoor and XMRig miner

Earlier this week, we discovered a new piece of Mac malware that is combining two different open-source tools—the EmPyre backdoor and the XMRig cryptominer—for the purpose of evil. The malware was being distributed through an application named Adobe Zii. Adobe Zii is software that is designed to aid in the piracy of a variety of Adobe applications. In this case, however, the app was called Adobe … [Read more...]

7 Tips for Improving Your Time to Completion

When managed services providers (MSPs) are looking for ways to improve business growth and increase customer satisfaction, time to completion (TTC) is a common metric that can help move the needle on both.  Read More … [Read more...]

Thycotic Named a Visionary in the 2018 Gartner Magic Quadrant for Privileged Access Management

 Evaluation Based on Completeness of Vision and Ability to Execute WASHINGTON, D.C., December 7, 2018 — Thycotic, provider of privileged account management (PAM) solutions for more than 10,000 organizations worldwide, today announced that it has been named a Visionary by Gartner, Inc. in its December 2018 Magic Quadrant for Privileged Access Management.1 Gartner recently published its top 10 … [Read more...]

7 tips to help you implement a GDPR staff awareness training programme

Staff awareness training is an essential component of the GDPR (General Data Protection Regulation), but do you know how it works in practice? Here are seven things you can do to make your awareness programme a success. Consider your requirements There isn’t a ‘one-size-fits-all’ approach for staff awareness training. Every organisation needs to tailor its programme according to several … [Read more...]

Top Trends & Challenges: Shifting to the Cloud

Moving to the cloud can actually create as many challenges as it solves. This is especially true if a company’s goals for the cloud aren’t in keeping with what the cloud can accomplish. The cloud can do many things, but it isn’t magic. And expecting magic is a sure fire way to be disappointed. Here are some ways in which leaning towards the cloud tech can create some challenges for … [Read more...]

Why Aren’t Consumers Angrier About Data Breaches?

Over the last few years we have been unfortunate enough to be witness to numerous data breaches of unimaginable size and scale. So why have these organizations been able to recover so quickly and why aren’t consumers angrier about how their data is being handled? Target, Facebook, Equifax, British Airways and Cambridge Analytica (to name a few) are all examples of companies failing to adequately … [Read more...]

Q&A: Data-Management Challenges Facing Construction Companies

This is the second of a three-part Q&A blog series featuring Adam Kailian, IT Systems Administrator at Build Group, a leading Northern California construction firm. Discover how Build Group has kept up with fast-changing technologies, data-management challenges facing construction companies, and why Druva and Build Group have formed a strong relationship. Q: What do you think is the biggest … [Read more...]

“Are You Sure That Went Through?” Viewing File Transfers in Real-Time

In a perfect world your file transfer solution would flawlessly complete every single file transfer quickly, completely and without delay. Unfortunately, we don’t live in a perfect world and a multitude of factors can delay or prevent your scheduled file transfers. … [Read more...]