Security

email messaging marketing trends

Authentication, Personalization and Automation Among Email Industry’s Biggest Opportunities in 2019

2018 was a big year for email vendors and senders alike. From large-scale consumer data privacy legislation like GDPR and the California Consumer Privacy Act, to major updates from mailbox providers like Gmail’s massive redesign and the consolidation of Verizon, […]

Authentication, Personalization and Automation Among Email Industry’s Biggest Opportunities in 2019 Read More »

Inner Circle podcast hosted by Tony Bradley TechSpective

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 …and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of Threat Intelligence at

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook Read More »

zero trust privileged access management

Why Smart CISOs Focus First on Trust

The cybersecurity arms race continues to accelerate. Machine learning and artificial intelligence (AI) make bad actors smarter. Exploits become more sophisticated. Mobile devices multiply the doorways into an organization. As a CISO, how do you keep up? Even though you

Why Smart CISOs Focus First on Trust Read More »

risk management compliance financial services

Financial Services Firms Need More than Policies to Manage Communications Risk and Compliance

Financial services might be one of the last customer-centric industries where actual human-to-human phone calls are still a primary channel for doing business. The workforce is getting younger, and digital natives (those born in the Internet era, starting with the

Financial Services Firms Need More than Policies to Manage Communications Risk and Compliance Read More »

vulnerability management cybersecurity

Vulnerability Management Software – An Essential Piece of the Security Puzzle

No single security solution can make a network safe from all attacks. Firewalls and IPS can’t keep workstations free of viruses and malware. Antivirus can’t protect the data on a database server. Essentially, it’s a matter of balancing multiple solutions.

Vulnerability Management Software – An Essential Piece of the Security Puzzle Read More »

Black Friday Cyber Monday cybersecurity

Make Sure Your Network Security Is Ready for the Holiday Shopping Season

The holiday shopping season kicks off tomorrow. There will be a notable spike in holiday shopping as people across the country rush to take advantage of the deals and bargains available on Black Friday and Cyber Monday. For retailers, it

Make Sure Your Network Security Is Ready for the Holiday Shopping Season Read More »

hybrid database hybrid cloud data

A Hybrid Cloud Strategy Does Not Equal a Hybrid Database, But You Still Need Both

Digital transformation is pushing enterprises to modernize their application strategies, which drives cloud adoption. This, in turn, drives a database management strategy. However, many enterprises are beginning to understand that a hybrid cloud strategy does not equal a hybrid database

A Hybrid Cloud Strategy Does Not Equal a Hybrid Database, But You Still Need Both Read More »

National Cybersecurity Awareness Month boogeyman

Insider Threats: Keeping the Cyber Boogeyman Out

There’s a reason why National Cybersecurity Awareness Month coincides with the Halloween season. After all, what’s scarier than a cybercriminal making his way into an organization? Well for starters, how about the employee that may unknowingly be to blame for

Insider Threats: Keeping the Cyber Boogeyman Out Read More »

Scroll to Top