dcsimg

Perimeter 81 Named Gartner ‘Cool Vendor’ for Network and Cyber-Physical Systems Security

Reading Time: 3 minutesTel Aviv, April 24, 2019 Perimeter 81, a leading Secure Network as a Service and zero-trust Software-Defined Perimeter (SDP) provider, announced today that it has been selected by Gartner as a “Cool Vendor in Network and Cyber-Physical Systems Security.” Perimeter 81 is designed to simplify secure network, cloud and application access in the age of … The post Perimeter … [Read more...]

Common Network Authentication Methods

Cybersecurity is perennially in the news these days. Every week it seems a different company is victimized by hackers stealing sensitive data—which is why providing robust network security for your clients is more important than ever. The paramount responsibility of a secure system is to ensure that only authorized users have access to the network. Security protocols need to let legitimate users … [Read more...]

Accelerate your compliance project with our free ISO 27001 bundle trial

The growing risk of data breaches coupled with the GDPR’s (General Data Protection Regulation) strict regulatory requirements has led many organisations to look for proven, affordable ways to achieve robust cyber security.  For many, the solution has come in the form of ISO 27001, the international standard for information security.  The most recent … [Read more...]

Everything You Need to Know About China’s Cybersecurity Law

In this article, we'll  answer some of the most common questions about the CSL, and make compliance goals as clear as possible. … [Read more...]

Podcast: Have You Met? David Perkins, Level 8 Solutions

Level 8 Solutions called into the Defrag This - Have You Met? podcast studio to provide some insight into how they are implementing IT solutions in the UK. … [Read more...]

Consumers have few legal options for protecting privacy

There are no promises in the words, “We care about user privacy.” Yet, these words appear on privacy policy after privacy policy, serving as disingenuous banners to hide potentially invasive corporate practices, including clandestine data collection, sharing, and selling. This is no accident. It is a strategy. In the US, companies that break their own privacy policies can—and do—face … [Read more...]

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches. … [Read more...]

Steps to Troubleshooting DNS Issues

<p>If a user’s browser window comes up blank with a message that the “server DNS address cannot be found,” this signals a DNS error that needs your instant attention. The inability to access the internet or particular sites can have an immediate negative business impact. DNS troubleshooting can be a headache for managed services providers (MSPs), but it’s crucial that they understand the ins … [Read more...]

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report— Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM).  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and … [Read more...]

Metrics and Maturity: Benchmarking Your Cyber Exposure Over Time

In part four of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question “How are we reducing our exposure over time.” Here’s what you need to know. When you’re tasked with addressing thousands of vulnerabilities per year, it’s hard to imagine having the luxury to pause and assess your current performance against prior periods. But the … [Read more...]