Blockchain in Healthcare: Greater Security, Fewer Mistakes, Less Paper

If the first thing that comes to mind when you hear “blockchain” is Bitcoin, you’re not alone. Cryptocurrencies were built on blockchain’s system of using distributed, permissioned computing to create a virtual ledger that could be used to confirm and ensure the accuracy and security of transactions. In the healthcare industry, where the security of [...]

By |2019-10-18T11:15:16-05:00October 18th, 2019|Blog|Comments Off on Blockchain in Healthcare: Greater Security, Fewer Mistakes, Less Paper

Know Your IaaS From Your SaaS: Crucial Security Considerations for Cloud Service Models

The high percentage of organizations that are using cloud services, currently migrating to the cloud or planning their move to the cloud isn’t all that surprising. When the destination is digital transformation, cloud computing is the bullet train organizations are riding to get there. Forrester’s forecast for cloud computing in 2019 concluded: The largest public [...]

By |2019-10-02T11:16:56-05:00October 4th, 2019|Blog|Comments Off on Know Your IaaS From Your SaaS: Crucial Security Considerations for Cloud Service Models

Preparing Your Website for the Holidays

As e-commerce continues to expand its reach beyond the traditional browser onto connected devices—smartphones, tablets, laptops, etc.—ensuring your business is ready to handle peak season traffic is an inevitable consideration. It is critical to plan appropriately beginning in the July/August timeframe and ensure the right parties are involved—not just your technical team, but other key [...]

By |2019-08-20T17:30:45-05:00August 19th, 2019|Blog|Comments Off on Preparing Your Website for the Holidays

Case Study: NEBCO Modernizes with a World-Class Security Program and Hybrid-Cloud Solution

NEBCO, Inc., is a fourth-generation Nebraska-based organization made up of 25 entities with business interest in such things as concrete production, mining, heavy construction, bonding real estate and recreation. In 2016, NEBCO’s IT leader recognized the need for a formal security program to ensure the integrity and availability of their data and systems. In addition, [...]

By |2019-10-01T15:57:02-05:00August 16th, 2019|Blog|Comments Off on Case Study: NEBCO Modernizes with a World-Class Security Program and Hybrid-Cloud Solution

5 Deception Technologies for Evolving Cyberthreats

Attack, defense, risk, threat. The language of cybersecurity sounds like a glossary of terms for all-out warfare. In many ways, that’s exactly what it is. Cybersecurity is an ongoing, ever-changing battlefront for the protection of your data, your users, your assets and your reputation. For more insight into the shifting landscape of cybersecurity, download our [...]

By |2019-07-18T10:20:14-05:00July 19th, 2019|Blog|Comments Off on 5 Deception Technologies for Evolving Cyberthreats

5 Security Stats You Should Know for 2019

It’s no surprise that a data breach can cost businesses millions of dollars. Organizations must protect their data no matter where it is stored, used or transmitted. Varonis compiled 60 cybersecurity statistics to give you a better idea of the current cybersecurity state, and we’ve broken out five key facts to help you rethink your [...]

By |2019-05-31T10:49:27-05:00June 5th, 2019|Blog|Comments Off on 5 Security Stats You Should Know for 2019

Playing Offense in Today’s Cybersecurity Game

Prevention alone will eventually fail: just read the data breach headlines making news on a weekly—if not daily—basis. Many companies are asymmetrically focused on the defensive role and not focused enough on preparing for the inevitable. Subbing-in an offensive team has its perks. First, let’s go back to the basics: Offense: The action of attacking [...]

By |2019-05-08T10:04:36-05:00May 15th, 2019|Blog|Comments Off on Playing Offense in Today’s Cybersecurity Game

Managing Third-Party Risk: Lessons from the Field

With the growing amount of third-party vendors working with or for your company, it’s imperative to do your due diligence to effectively protect against growing threats that are hitting major third-party vendor and business partners. Third-Party Risk Management Basics Third-party risk management is the process of analyzing and controlling risks to your company’s data, finances [...]

By |2019-04-30T09:39:09-05:00April 29th, 2019|Blog|Comments Off on Managing Third-Party Risk: Lessons from the Field

6 Stages to the Analytics-Driven Security Journey

Splunk recently released a security eBook to help companies understand the challenges and action steps to a security program that utilizes data to stay ahead of attacks. Here is a breakdown of the suggested six stages of the Analytics-Driven Security Journey, so you can get started on your voyage. Stage 1: Collection Collect basic security [...]

By |2019-04-17T09:01:42-05:00April 17th, 2019|Blog|Comments Off on 6 Stages to the Analytics-Driven Security Journey