Posts From CCME
Top 5 Best Data Loss Prevention Software in 2017
We’re collectively creating a massive amount of data on a daily basis. In fact, according to research from tech giant IBM, our devices generate around 2.5 quintillion bytes of the stuff every day. Businesses are no different. In fact, their
State of Remote Access Security
Nearly three-quarters of the U.S. workforce will be mobile workers by 2023, IDC predicts. With so many employees on the road at least part of the time, being able to access business critical applications remotely is key to the way
In May of this year, organisations across the globe were hit by a malicious ransomware attack that left over 230,000 systems in a state of chaos, with hackers demanding ransom for systems to be returned to normal. With up to
BeyondTrust, the leading cyber security company dedicated to preventing privilege abuse and stopping unauthorized access, announced that for the fourth straight year, it is listed as a Representative Vendor in Gartner’s August 2017 Market Guide for Privileged Access Management (PAM).
What’s the difference between SDN and NFV?
SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years. Software defined networking (SDN), network function virtualization (NFV) and the related virtual network functions (VNF) are important trends. But
We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is
5 Hot Enterprise Backup and Recovery Vendors
The data backup market is changing fast. Here are five vendors leading the transformation. The backup and recovery market has become a crowded space, with hundreds of vendors vying for market share. At the higher end of the market, the
As Ron Kehoe wrapped up his Data Center World session about Network Security Policy Management (NSPM) this past Wednesday, an attendee, sounding as though he had just learned about the Holy Grail of security, asked: “And, this technology is available
Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the authorization to tweak the cloud provider’s pre-packaged stack.
7 Database Security Best Practices
Databases – by definition – contain data, and data such as credit card information is valuable to criminals. That means databases are an attractive target to hackers, and it’s why database security is vitally important. In this article we cover
CrowdStrike Evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions
Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*. This is the first direct competitive analysis of endpoint detection and response (EDR) vendors. The report provides an assessment of
Historically the Internet of Things (IoT) has been much more hype than substance. Sure, there have been a few verticals such as oil and gas and mining that have embraced the trend, but those vertical have been active in IoT
If you’re trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National Institute of Standards and Technology thinks you should try — and the agency wants to help you implement it in
DDoS are growing. Designed to take down a website or network infrastructure, they can be volumed based, where a service is swarmed with requests, or protocol request based, which use TCP/IP requests from false IP addresses to wear down resources.