The New Reality: Securing the Unbound Enterprise

The New Reality: Securing the Unbound Enterprise

Most enterprises, if not all, are operating today as an unbound enterprise. Against the backdrop of the post-COVID era, the new reality is nearly everyone is working remotely and companies are continuing to migrate key data, services and apps to the cloud. Out of...
What are Data Security Solutions and How do They Work?

What are Data Security Solutions and How do They Work?

Data is one of the valuable commodities shared by all organizations regardless of size, location, or the industry it operates in. Today, businesses hold more data than ever, with large volumes being generated, stored, sent, and received. There is more regulation to...
NIST 800-171 Compliance Checklist

NIST 800-171 Compliance Checklist

NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, focuses on information shared by federal agencies with non-federal entities. Issued by the National Institute of Standards and...
Massively exploited vulnerabilities in MS Exchange Server

Massively exploited vulnerabilities in MS Exchange Server

Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network. Microsoft has issued out-of-band patches for several Exchange Server vulnerabilities. Four of these vulnerabilities, according to the company, are...