Security

incident management platform cybersecurity

Crucial Capabilities of a Modern Incident Management Platform

What to Look for in an Incident Management Platform Much like any other strategic business decision, choosing a suitable incident response and management platform takes some serious thought. After all, the security of an organization’s data and systems is paramount […]

Crucial Capabilities of a Modern Incident Management Platform Read More »

endpoint security EDR cybersecurity

Securing an Organization: Top 5 Cybersecurity Solutions for Prevention, Detection and Response

Every organization is looking for the best endpoint security—a way to protect their assets, especially with today’s rapidly changing threat landscape and increasingly regulated business environment. Getting breached has consequences not only for an organization’s customers, users and the bottom

Securing an Organization: Top 5 Cybersecurity Solutions for Prevention, Detection and Response Read More »

Inner Circle podcast hosted by Tony Bradley TechSpective

Mike Armistead Discusses Why We Shouldn’t Fear Our New AI Overlords

Inner Circle Podcast: Episode 011 My guest on the Inner Circle podcast this week is Mike Armistead, co-founder and CEO of Respond Software. We talked about artificial intelligence (AI) and the increasingly important role that AI and machine learning (ML)

Mike Armistead Discusses Why We Shouldn’t Fear Our New AI Overlords Read More »

BlackBerry BRIDGE Microsoft Intune

The BlackBerry Enterprise BRIDGE: The Most Important Product You’ve Never Heard Of

We don’t take security seriously enough—particularly with regard to our personal device use. The communications we have with these devices can be work-related, finance-related, medical in nature or legal in nature, and involve people like our kids or parents who

The BlackBerry Enterprise BRIDGE: The Most Important Product You’ve Never Heard Of Read More »

risk management iso 27001

Less Pain, More Gain: A Better Way to Work Toward Improved Information Security Risk Management and ISO 27001 Compliance

How have the recent privacy and security violations crowding the daily newsfeeds changed your company’s behavior? There’s a silver lining to all the doomsday headlines — they should compel stakeholders in your company to pay more attention and provide more

Less Pain, More Gain: A Better Way to Work Toward Improved Information Security Risk Management and ISO 27001 Compliance Read More »

Oracle Java deserialization

Will Dropping Serialization from Java Remove the Vulnerabilities?

During “Ask The Architect” at the Devoxx UK 2018 conference, Oracle’s chief architect, Mark Reinhold, called Java’s serialization mechanism a “horrible mistake” and a virtually endless source of security vulnerabilities. More importantly, Reinhold announced Oracle’s decision to improve Java’s security

Will Dropping Serialization from Java Remove the Vulnerabilities? Read More »

IoT attacks IoT security

This Isn’t a Tech Thriller: IoT Attacks Are Real

If you read enough tech thriller or science fiction books, you’re bound to be familiar with a super villain using some kind of technology to wreak havoc across the planet—often triggered by hacking critical internet-of-things (IoT) systems. But the fact

This Isn’t a Tech Thriller: IoT Attacks Are Real Read More »

Scroll to Top