cloud security

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

Cybercriminals Make a Lot of Money. Because it is Too Easy

A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.

To Be, or Not To Be— Certified? That Is the Question. Or, Is It?

Thinking about adding an acronym to the end of your name to get your foot in the InfoSec door? Rick McElroy, security strategist for Carbon Black, offers direction for those navigating the ever-changing certification game.

Shadow IT & Clouds. Let’s Minimize Risks & Enjoy the Benefits

With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.

Head in The Clouds & Feet on The Ground: The CCSP Certification

How do you increase your value as a cybersecurity expert and pass the CCSP? Certified Cloud Security Professional Michael Lyman lays out a powerful 7-step plan so you too can master Cloud Security

Legacy Tech: Someone or Something Might Be Lurking in The Shadow

Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.