Cybersecurity


By Roger Northrop, Chief Technology Officer at Mutare Voice phishing (“vishing”) has emerged as a new and increasingly concerning security vulnerability for businesses. The tactic involves a criminal agent or agents posing as a trusted source in order to trick their victims into divulging passwords or other protected information over […]

Watch out! 5 Reasons Vishing is on the Rise – ...


By: Gordon Cooper, Director of Customer Solutions at Ardoq There’s often an allotted margin of error when it comes to business strategy or finance. Mistakes are built into the plan and are, to an extent, an accepted part of the process.  However, the rules couldn’t be more different for enterprise […]

Architecting the Enterprise for Cybersecurity: Visibility-Focused, Data-Backed, and Streamlined




By Kaushal Saraf, Lead Engineer at Atomus Microsoft Azure Active Directory (AD) provides businesses with a cloud-based identity and access management service for safeguarding their resources, applications and services from unauthorized access. As such, it is an integral part of any organization’s security infrastructure. This post will discuss two simple but […]

2 Ways To Create a Robust Security Baseline Using Microsoft ...


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Ensuring data center security is a complex but necessary undertaking. Reliable cybersecurity means accounting for all relevant threats. Malware and social engineering typically take up most people’s focus as they’re among the most common, but distributed denial of service (DDoS) attack prevention deserves attention, […]

Can Your Data Center Safeguards Stop a DDoS Attack In ...




By Hila Meller, Managing Director Global Security Sales, BT Group With unprecedented need for scale, flexibility, and access to data and applications, organizations are turning toward cloud to remain competitive in a rapidly changing business environment. According to IT company Flexera’s annual “State of the Cloud” report, 59 percent of […]

Three Critical Steps to Secure Your Move to the Cloud






By Bal Heroor, CEO and Principal at Mactores It’s easy to forget about cybersecurity risks in good times. These are the moments when organizations, stakeholders, and investors are led to believe that the cybersecurity risk exposure facing a business is negligible or easily manageable. Such a prevailing sentiment then pushes […]

How Data Security Breaches Affect a Company’s Value


By Apu Pavithran, Founder and CEO at Hexnode Congratulations, you’ve survived a grueling cyber-attack. Unlike Codespaces, The Heritage Company, Travelex or many others like them, you didn’t go bankrupt. Instead, you’ve managed to keep your ship afloat through some innovative preventive measures and a hint of good luck. However, the […]

Three Practices to Better Bolster Your Cyber-Defense