Twitter 2.0: A Lesson in Operations and Cybersecurity Risk
In the midst of the initial chaos at Twitter, there was radio silence from the main @twitter account for several days.
November 22, 2022
Read MoreIn the midst of the initial chaos at Twitter, there was radio silence from the main @twitter account for several days.
November 22, 2022
Read MoreThe potential for digital data systems interruptions is a major threat that businesses must contend with. Finding fast, reliable and safe solutions to maintaining high availability during disaster or failure situations is critical to protecting data...
November 16, 2022
Read MoreWhen it comes to managing restricted access within an organization’s IT and digital assets, systems administrators have many factors to consider when granting privileges. IT decision-makers need to prioritize cybersecurity while also providing a way...
November 11, 2022
Read MoreThe back-to-school season is typically an exciting time for most, but what comes next for higher education institutions often leads to headaches. Before students reach campus or sign on remotely, the college or university has to onboard thousands of...
November 9, 2022
Read MoreHiring new employees and awarding promotions from within can be promising for company growth — but challenging for IT teams. The job market is hot, filled with millions of openings and new hires. For the HR and IT departments, it leads to the...
November 3, 2022
Read MoreCredentials are the keys you use to access everything from your email account to your organization’s most sensitive data. These keys are not all created equal. Sure, you always need to have access to your email. Does the same hold true for...
October 13, 2022
Read MoreLegacy MFA is dead.
It’s been a security fundamental for years, and is still widely considered a best practice for user security. But countless recent attacks show us that traditional multi-factor authentication (MFA) is no longer an obstacle to...
October 3, 2022
Read MoreFor decades, many IT and security leaders were obsessed over physical infrastructure and the strength of its closed perimeter. Informational technology infrastructure was about on-premises components — hardware, software, networking, operating...
March 29, 2022
Read MoreThroughout 2021, the number of attacks and headlines ransomware generated grew exponentially. Ransomware is now part of 10% of breaches, and it doubled in frequency in 2021, according to the 2021 Verizon Data Breach Investigations Report. Not only...
March 22, 2022
Read MoreThe list of cybersecurity hurdles in higher education is long, from department resources to cost to leadership approval. However, as ransomware attacks continue to rise, especially among colleges and universities, overcoming those challenges has...
March 3, 2022
Read More