August 31, 2021
Privileged Access Management
A #Curio Session Hosted By: Joe Schnell Sr. Cybersecurity Architect Joe Schnell discusses how recent technology changes require a shift in strategy, specifically focused on privileged access, and how identity strategies can improve your cybersecurity resilience.
Read more
August 23, 2021
Managing Human Risk
A #Curio Session Hosted By: Lance Spitzner Director, SANS Security Awareness Lance Spitzner explains and identifies what human risk is, and what to measure and how. He provides the three key steps to building a strategic plan and how to effectively manage it.
Read more
August 23, 2021
Q & A: Security & The Cloud
A #Curio Session Hosted By: Three of our industry leading experts Three of our industry leading experts on architecting and securing the cloud answer relative questions on moving to the cloud. They touch on industry leading topics and answer your most pressing questions on cloud security.
Read more
July 29, 2021
How to Choose the Right SASE Solution For Your Business
Among the latest networking and security technologies, one stands out not only for its capabilities but also its abbreviated name with an attitude. Secure Access Service Edge (SASE, pronounced “sassy”) brings networking and security technologies into an integrated, scalable service delivered from the cloud.As the number of vendors claiming to offer a SASE technology grows, […]
Read more
July 08, 2021
Is Passwordless Authentication the Future?
When it comes to hacks and data breaches, what is the most common way cybercriminals breach sensitive information? Are they master hackers that can bypass firewalls and other security measures? Not quite.More often, breaches are simply from an actor logging into the system with stolen credentials. To support this use of identity-based breaches, phishing attacks […]
Read more
June 23, 2021
How to Prevent Supply Chain Attacks
How confident are you in not only your network security but also the integrity and reliability of your supply chain? In a seemingly continuous stream of recent data breaches and ransomware attacks, every organization has to ask that question. Many businesses might get high marks for fortifying their own network security. But malicious actors are […]
Read more
May 13, 2021
The Benefits of Breach and Attack Simulations for Your Environment
Ensuring that your network, applications, and systems are secure is essential to a successful organization’s cybersecurity strategy. Avoiding breaches in your environment means that your data—both internal and client data—is not going to be compromised, and a critical part of verifying your preparedness is regular testing. For these reasons, it’s essential to keep looking for […]
Read more
April 07, 2021
“It Can’t Happen,” Happens All the Time
There is a distinct line between being confident and being presumptive. The problem with presumption is it often presents itself as certainty but is a misguided sense of confidence that can blind us to reality. In the practice of Business Continuity, the ultimate foe is presumption. Earthquakes, hurricanes, and floods can all be prepared for in advance. Presumption prevents any form […]
Read more
March 17, 2021
CYBERSECURITY AND WORKING FROM HOME: SECURING THE ENTERPRISE
The new normal, as it has been dubbed, is affecting all businesses. Regardless of their size or what industry they operate in, companies worldwide have been forced to adapt to working from home during the COVID-19 pandemic. There has certainly been a learning curve, as many companies were caught unprepared for this dramatic shift with […]
Read more