compliance

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

Data Access And Security Are Out Of Sync

Enterprises  are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges.

SECURE DESIGN PRINCIPLES: How to Build Stuff Against Attacks

There is an overarching theme driving these security breaches: ineffective adherence to secure design principles. Expert Ted Harrington explores the world of secure design principles (and anti-principles) as a means to build resilient systems.

Human Factors Are Causing Most of Today’s Network Outages and Vulnerabilities

Network engineers are forced to keep up with the complexities and changes brought by hybrid clouds, containers, SDN and other developments. Throw the human element into the mix, and you have a recipe for outages and vulnerabilities. Expert Sajid Awan explains the significance of key findings from a global study conducted by Dimensional Research and what they mean for networks.

We Have No Choice. We MUST Make 2017 the Year of Cybersecurity

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.

It Takes A Village, And A Town Square

When thinking about the elements of a village, you may think about people, homes, transportation and commerce. However, there’s another critical component that sits passively in the backdrop yet plays a very frontal role. In this Experts Corner, Ryan Stolte connects the town square to the business bringing together people, process, and technology to reduce cyber risk.