dcsimg

Business Continuity Planning: 5 Actions CISOs Need to Take Now

Organizations around the globe are engrossed in one of the major network revolutions of all time. The COVID-19 pandemic forced organizations to quickly adapt to different challenges over the past six months. With the sudden transition to working from home, organizations were required  to rethink their digital strategy in order to deal with the new … The post Business Continuity Planning: 5 … [Read more...]

Security Solutions Escort Banks Through the Cloud Shift

Data is a commodity that has value just like any other: It can be used to pay for products and services (most free apps use your data in exchange for access), it can be bought and sold, and as we all know, it can change hands. Unfortunately, it doesn’t always fall into the right ones, … The post Security Solutions Escort Banks Through the Cloud Shift appeared first on Perimeter 81. … [Read more...]

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Chuck Brooks, cybersecurity evangelist and adjunct professor for Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, about identity and access management technology. This set of technologies and policies … [Read more...]

Cloud workload security: Should you worry about it?

Due to the increasing use of the cloud, organizations find themselves dealing with hybrid environments and nebulous workloads to secure. Containerization and cloud-stored data have provided the industry with a new challenge. And while you can try to make the provider of cloud data storage responsible for the security of the data, you will have a hard time trying to convince the provider that they … [Read more...]

FWaaS Prevents the Cloud from Going Up in Flames

Firewalls are aptly named, because they stop the spread of flames beyond the wall, and help to preserve the building itself from falling down or burning to a crisp. The metaphor works just as well with malware defense as it does fire safety, but now that we’ve moved to the cloud en masse, “fire” can … The post FWaaS Prevents the Cloud from Going Up in Flames appeared first on Perimeter 81. … [Read more...]

How to Use Azure Spot to Reduce Azure Virtualization Costs

This article explains how Azure Spot can provide a scalable virtualization management solution saving you from using unnecessary VMs. Read the post here: How to Use Azure Spot to Reduce Azure Virtualization Costs … [Read more...]

Why You Should Use OneDrive for Business

This article looks at what Microsoft OneDrive for Business is, and how to govern the features that make up this excellent cloud storage solution. Read the post here: Why You Should Use OneDrive for Business … [Read more...]

The Real Cost of Microsoft 365 Revealed

In this article, we break down the complete pricing of Microsoft 365, and how you can help your business maximize your investment in M365 services Read the post here: The Real Cost of Microsoft 365 Revealed … [Read more...]

Can SASE Reinforce Remote Voting?

Election interference is the new normal, or perhaps it quietly has been for some time now. Until recently, though, it has escaped the limelight because the process of voting in most places has barely changed since the dawn of democracy. People show up their designated voting booth, wait in line, verify their identities and cast … The post Can SASE Reinforce Remote Voting? appeared first on … [Read more...]

Tightening Security on Microsoft Teams

Remember driving down to your local computer store and picking up a shiny new copy of the latest Microsoft Word? Sleek in its box, the neatly wrapped Microsoft product had both disc and license inside, but it also came with something you didn’t bargain for: responsibility for its successful, safe operation.  As a physical offline … The post Tightening Security on Microsoft Teams appeared … [Read more...]