Explained: cloud-delivered security - What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There's a good chance that it might.
Harnessing the power of identity management (IDaaS) in the cloud - With security, compliance, and customer engagement driving organizations to the cloud, it's no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.
Explained: the strengths and weaknesses of the Zero Trust model - Zero Trust is an information security framework that insists its users
Explained: data enrichment - Data enrichment applies to the process of enhancing, refining, and improving raw data. Used by companies to improve marketing efforts, data enrichment impacts both privacy and security.
Explained: edge computing - What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.
Explained: What is containerization? - Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?
Explained: juice jacking - Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.
Explained: war shipping - War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it.
How security orchestration improves detection and response - Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Select your language