by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
A new survey into cloud concerns undertaken by database security firm HexaTier provides no surprises: security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption (although we are specifically talking...
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
Cyber insurance rates have dropped, thanks to a drop in major data breaches. The relative quiet in massive breaches has prompted insurers to lower insurance prices during first three months of 2016 for high-risk industries including retail and healthcare, according to...
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online....
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
It all depends upon your level of risk and how badly you want the data returned to you unharmed. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene. We’re undergoing one of the biggest transformational changes in IT since the introduction of the...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
As new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and...