by Brian McCarthy | May 9, 2020 | 2020 elections, Cybersecurity, Firewall, Premium content, Report, Transformation
While most enterprises have come to terms with the fact that a security incident is not a factor of “if,” but rather “when,” many are still struggling to translate this into the right security architecture and mindset. FireEye’s Cyber Trendscape 2020 report found...by Brian McCarthy | Aug 7, 2019 | Cybersecurity, Premium content, Security, Transformation
Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it impacts overall protection. The problem is that when things are running smoothly, it’s...by Brian McCarthy | Aug 1, 2019 | 2020 elections, Cybersecurity, Premium content, Security, Transformation
The growing presence of cyber threats to elections has resulted in many election organizations scrambling to develop security strategies involving people, processes and technology. When developing these security strategies, organizations should consider a three-part...by Brian McCarthy | Jul 30, 2019 | Cybersecurity, Premium content, Security, Transformation
Before you give the go ahead to acquire or merge with another company, consider what happened to Marriott. Also know there is a better way then “just assuming” your new partner has been protecting their castle. Click below to download Richard...by Brian McCarthy | Apr 14, 2019 | Blog, Cloud, Data Protection, DRaaS, Transformation
Retiring legacy DR for DRaaS benefits can be well worth it The benefits of disaster recovery as a service include lower cost, enhanced reliability and streamlined administration. It’s no wonder that more organizations are being drawn to it. ...by Brian McCarthy | Mar 10, 2019 | Cloud, Data Protection, eBook, FW-as-a-Service, Premium content, Security, Transformation
More powerful than NGFW without the cost and complexity Many organizations are turning to local internet breakouts and SD-WAN to give users fast and secure access to cloud applications. But, how can a cloud-first organization deliver enterprise firewall...