1. security

    How Prepared Are You To Survive Ransomware? Just Check Your R-Score

    Ransomware can be hard to defend against. Difficulties begin with finding it in the first place, then stopping attacks, and, finally, recovering from those attacks. It’s so tough because the malware can have tentacles all throughout your infrastructure—on your servers, in your storage, on your n… Read More

    By Keith Ward
  2. security

    Elisity Says That Proper Security Means Trusting No One

    “All of the work that’s done to secure assets is great, but all it takes is exploiting the weakest link in the chain.” That’s the governing philosophy as expressed by Elisity CEO James Winebrenner, and it’s why Elisity focuses on the “zero trust model.” “Zero trust” is a hot ind… Read More

    By Keith Ward
  3. security

    Ordr Helps You Get Control of Your Connected Devices

    Connected devices, including traditional IT, Internet of Things (IoT), and Operational Technologies (OT), are proliferating at a mind-boggling rate. That can be useful, but it also comes with significant risk: many of these devices are essentially invisible on your network. That means you don’t kn… Read More

    By Keith Ward
  4. security

    Cofense: Stop Phishing Emails Before They Do Their Damage

    The Cofense website has this startling statistic: 90% of security breaches start with an email phishing attempt. That should make you sit up and take notice. In this “Spotlight Series” video, ActualTech Media Partner David Davis chats with Keith Ibarguen, chief product officer, Cofense, about… Read More

    By Keith Ward
  5. security

    Prevention as a Service? Where Do I Sign Up?

    “Prevention as a Service.” Now that’s an “X as a Service” that’s new in the industry, but it’s an exciting idea! According to Perception Point VP of Customer Success & Incident Response Motti Elloul, it means to protect customers from any content-based attacks from any channel that all… Read More

    By Keith Ward
  6. security

    Beef Up Your Cloud Security with Solvo

    “By 2023, 75% of security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020.” This statistic, from Gartner, should be a warning to organizations about upcoming security threats. Getting out ahead of that looming danger is what Solvo is… Read More

    By Keith Ward
  7. security

    Are You Experiencing Cybersecurity Tool Fatigue?

    According to global tech market advisory firm ABI Research, spending on cybersecurity for infrastructure will reach nearly $106 billion this year, an increase of about $9 billion over last year. Referring to the SolarWinds hack, Michela Menting, Digital Security Research Director at ABI Research… Read More

    By Keith Ward
  8. security

    Executive Q&A With Ananda Networks: Security Needs a Makeover

    Information security has been an issue ever since two computers were first joined together to share data. And now that most of the computers on the planet are networked—computers in this sense being anything from an IBM Z mainframe to an Apple Watch—security has become more important, and more c… Read More

    By Keith Ward
  9. security

    Deep Instinct: Cybersecurity Through Deep Learning

    Ransomware. Viruses. Malware. Zero-day attacks. The threats to your company’s systems and data are growing, and the bad guys are getting better at evading detection. The solution? To be smarter than they are. Deep Instinct does that by applying “deep learning” to cybersecurity, using advanc… Read More

    By Keith Ward
  10. security

    TrapX Offers Deception as a Service

    Does Deception as a Service sound like something you’d actually want? If TrapX is doing it, the answer’s Yes! In this case, TrapX is offering a way to make “honeypots” scalable and agile. Steve Preston, SVP, Strategy & Growth for TrapX, explains how it’s done in this Spotlight Series vi… Read More

    By Keith Ward
  11. security

    SASE: Rethinking Network Security in the Age of the Globally Distributed Cloud

    Today's network security solutions are proving inadequate, based on a major shift in the spotlight on where data and resources are located and work is performed in the enterprise network. With the increase in remote-based users, Software-as-a-Service (SaaS), and globally distributed cloud service… Read More

    By James Pyles
  12. security

    WannaCry Ransomware Hits Hard in 2019

    If your organization was pummeled by the WannaCry virus last year, you’re not alone: nearly a quarter of all ransomware attacks were of that variety. And the damage it did was staggering. That’s according to PreciseSecurity.com, which reported that WannaCry was the most common crypto ransomwa… Read More

    By Keith Ward