Security

From Prevention to Detection: NDR and the SOC Visibility Triad
Security teams have a powerful new way to detect and respond to cyberthreats early: network detection and response (NDR) solutions and the SOC Visibility Triad. Read on to find out what drives this strategy.
Articles

A Crucial Truth About SASE and Zero Trust You Need to Know
SASE solutions take security to users at the service edge better securing the new perimeter established by remote users. But does SASE get you to zero trust? Here’s what you need to know.

Busting the Top 3 Identity & Access Myths to Boost Security
Identity security should be at the core of your overall security strategy. And any path toward zero trust must include it. Make sure these common identity and access management (IAM) misconceptions aren’t hindering your efforts.

Who Benefits Most From a Security Platform Approach?
Discover what a security platform is, why the concept is gaining traction in the security industry, and how to know if it’s the right approach for your business.

Essentials for Endpoint Security and the Modern Workforce
Remote work, cloud access and IoT devices have created a rising tide of endpoints. Use these tips to regain visibility and control to better secure the endpoints accessing your network.

Why a Ransomware Preparedness Plan Is Your Best Defense Against Data Breach
Paying the ransom after a data breach is not your only option. Learn how businesses are being proactive with a ransomware preparedness model and eliminating the element of surprise.

Take a Proactive Data Security Approach With These 5 Ws
Develop a proactive data security stance with these five Ws to help you identify who is responsible for data security, what data needs to be protected, and where to start.

SASE Converges Cloud, Network and Security
The role of the data center as a communications hub is ending. Take a deeper look at what SASE is and how it’s poised to change the security landscape, especially in securing high-risk users.

Supply Chain Attacks and IoT Devices–Know How to Limit Your Risk
Targeting IoT devices may help hackers gain access where it’s least expected. Hear from Sirius Security and IoT experts as they explain how IoT devices may be impacted, and steps you can take to reduce your risk.

Securing IoT Devices and the New “Smart” Normal
The new, “smart” normal brings with it new safety measures, automated processes and a continued focus on efficiency as organizations strive to do less with more–but enhanced workplace safety may require enhanced security as well. How can you be sure that your new, “smart” devices or areas are secure?

What’s Next in the Evolution of the Firewall Ecosystem?
Access anywhere, anytime is challenging firewalls designed to protect a physically-defined network. See how the firewall ecosystem is evolving and adapting.

7 Things to Look For in an Email Security Platform
Before you select an email security platform, take a look under the hood to ensure that you are getting these fundamental features.

4 Things to Know Before You Set Up an Email Security Program
Learn how you can improve your email security program and what questions to ask to select the right vendor to help you implement it.

Top 5 Qualities of a Reliable Email Security Provider
The Office 365 ATP provides a good security blanket, but only whole-solution providers can tailor a comprehensive security solution to meet an organization’s specific needs and use cases. Find out the five must-haves to look for in a reliable provider.

Prepare for Error: 5 Best Practices for Email Security
These five best practices will help ensure your email security program is continuously and effectively protecting your people, your data and your intellectual property.

Level Up! How Effective Is Your Email Security Strategy?
How do you identify any gaps or vulnerabilities in your email security strategy? Evaluating your current email security practices through these three lenses is a must.

5 Keys to Addressing Insider Threats
Insider attacks are one of the biggest threats enterprises face. Is your organization doing enough to address them?

10 Keys to Data-Centric Security
Rally around your most critical information. Learn how organizations can advance their security by focusing their “crown jewel” data.

How to Secure Your Home-Based Workforce
Securing the connection of home-based employees to corporate resources is more important than ever. These steps will help secure employee-owned and BYOD systems.

Defending Against Encrypted Threats
WEBINAR – Learn how to eliminate security blind spots in encrypted traffic, deal with increasing SSL/TLS traffic, and maintain data privacy and regulatory compliance with Cisco NGFW or Cisco WSA plus F5 SSLO.

Delivering Effective Security Automation in a Complex Cloud World
Ease your cloud security complexity with a strategic security automation program, that when properly planned and employed, will enable your organization to implement a consistent, reliable security infrastructure.

7 Steps to Effective Data Classification
To ensure effective security, you need to establish exactly what you’re trying to protect.

7 Key Elements of a Successful Encryption Strategy
How to use encryption wisely and avoid common pitfalls.

10 Reasons Why Your Organization Needs Data Loss Prevention
Learn how data loss prevention can transform sensitive data into an operational asset.

6 Ways to Deceive Cyber Attackers
Learn how defensive deception can help level the playing field with cyber attackers.

4 Major Myths of Zero Trust Architecture
Zero Trust Architecture can help organizations maximize data security. Let’s debunk the myths so you can build a stronger security solution that aligns with the needs of your enterprise.

Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge
Mobile devices in the enterprise can pose major security risks. Here are five important risks worth examining and one key challenge to overcome.
Cloud Security Keeping You Up at Night?
WEBINAR — Learn how CASBs can help you avoid a cloud data nightmare.
The Six Pillars of Security: Pillar Six, Identity & Access Management
PODCAST — When it comes to identity and access management (IAM), short cuts aren’t an option. With the right strategy, IAM tools can help you build effective security without sacrificing efficiency.
The Six Pillars of Security: Pillar Five, Data Center & Cloud Security
PODCAST — Many organizations continue to struggle with security implications associated with the cloud. Weaknesses in a cloud or colocation vendor’s security can have a dramatic impact on your organization’s overall security posture.
The Six Pillars of Security: Pillar Four, Application Security
PODCAST — Applications have become an integral part of everyday life, and they contain some of your customers’ most confidential data. Explore how the rapid pace of development is affecting application security.

10 Steps to an Effective Vulnerability Assessment
Examine vulnerability assessments in the context of your business by following these key steps.

Build a Strong Encryption Strategy: 7 Essential Components
Seven elements can help you build a successful end-to-end encryption strategy.
Join our Newsletter
Stay up to date with the latest and greatest from our monthly newsletter
Most Popular Posts
