by Omar Zarabi | Dec 8, 2022 | Security Solutions
Why Zero Trust is the Future of Cybersecurity As the traditional perimeter security defenses crumbled, new holistic approaches sprang up to fill an ever-widening void. Now security was not confined to keeping the bad guys out, but defending from within. No longer...
by Omar Zarabi | Sep 2, 2022 | Security Solutions
Since there’s no more perimeter, how do you defend an enterprise? You pick what represents the biggest risk and defend from those angles. In a holistic approach, you’re considering everything from CEO buy-in to employee training to endpoint detection to network...
by Omar Zarabi | Jul 5, 2022 | Security Solutions
You don’t know what you’ve got until it’s gone. Unfortunately, when it comes to your data stores, you don’t know what you’ve got when it’s gone – unless you’ve backed up your data. Yes, this is an old shoe. Data backup is no new news, but believe it or not, in...
by Marketing | May 3, 2022 | Security Solutions, Services
Blog 3, final blog in the aaS Series Traditional software security solutions were made for hand-to-hand combat. You’d buy one solution to fix one problem: security breaches, spam, data loss, malware infection. The problem is that they are expensive and don’t provide...
by Marketing | Jun 18, 2021 | Compliance, Security Solutions
Author: Ryan Heinrich, Lacework See original Blog SOC 2 compliance is a hot topic in cybersecurity these days, but SOC compliance actually dates back almost four decades. Beginning in 1974, CPAs were required to consider the effects of information technology on...
by Bill Parmelee | Mar 31, 2021 | CMMC, Compliance, Security Solutions
The first in a multi-part blog series on CMMC. You can find part two, how the unique aspects of the CMMC model are especially well suited to the individual needs of the small and medium businesses in the Defense Supply Chain (DSC), here. Why CMMC? In late 2017 the...
Recent Comments