A ‘perk of employment’ trend is growing in popularity with businesses of all varieties: offering portable or mobile devices for both personal and work use. In fact 62% of companies will allow BYOD (bring your own device) by the end of 2013. While the intentions are good, the security implications can be catastrophic if a […]
Risk Management: Learning by example
When you’re in the field of risk management, you’re dealing with uncertainty. That’s probably why it’s difficult for some companies to really embrace and focus on risk management as a path to success. However, we do know for certain that risk management has worked in the past, and there are lessons in that for us. […]
Information security vs. spying
Whether you belong to a private or government organization, everyone can agree that information security is paramount to your success. Guarding your data should be a top concern for not only your company but also stakeholders or users. In the digital age where it seems like more and more personal information is readily available, following […]
Managing the cloud: Tenant issues
Using multi-tenancy public cloud space to store your data can provide companies a cost effective way to store data that comes with rapid access to new technology and good support. However, despite all the advantages of using a shared cloud, if something about a multi-tenant cloud makes you nervous, you’re not alone. With multiple tenants […]
4 signs your business continuity plan is in trouble
A good business continuity plan (BCP) will keep your business functioning through any incident, such as disasters, accidents, or emergencies. Unfortunately, because of the infrequent use of the plan, it is often neglected. Of course, companies keep it “up-to-date” enough to satisfy regulatory standards, or to avoid audits, but that bare minimum is not enough […]
Is mobile affecting your IT business strategy?
Attitudes about technology in the workplace are shifting. It used to be people would show up for a job and ask what devices they should use, what was supported. Now, employees show up with their own devices and expect multiple platforms and operating systems will all be supported. Mobile is increasingly influencing mainstream IT. Employees […]
Struggling to define your organization’s security requirements? Start here.
Prepare yourself for a harsh truth; technology cannot always protect you. In fact, a large amount of attacks are aided by a company’s lack of requirements and restrictions, not the lack of the newest software. When creating a security plan you need to build your strategy from the ground up by beginning with finding where […]
Thanks for a great 2013 Secure360 Conference!
We had another successful Secure360 conference this year. We brought together over 1,200 attendees–professionals including executive level leaders, directors, mid-level managers, technology personnel and consultants from all over the security world to discuss topics ranging from physical security to cyberwarfare. We hosted more than 90 sponsors and exhibitors. There was a lot of energy and more […]
Sponsor highlight: All about Check Point
One of our three Platinum Sponsors for the 2013 Secue360 Conference includes Check Point, the worldwide leader in securing the Internet. We recently interview Liz Cruz, field marketing manager – US Central Region about the company. Secure 360: Can you give us a little background about Check Point Software Technologies Ltd. and let our audience […]
One week until the conference! 5 things to do while you’re here
It’s coming! The Secure360 conference is only one week away. We’re super excited, and with so much stuff going on, we thought we’d highlight for you 5 things to do when you’re here: Preconference Can’t wait to get started? The preconference begins Monday, May 13 at 7 AM with registration and workshops at 8 AM […]