Three Cyber Threat Hunting Myths

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and isolate advanced threats that evade existing security solutions.

Five common misconceptions about DDoS

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why someone might initiate a DDoS attack and outlined the three variations of attacks.

In part two of this series, I refute five commonly held misconceptions about DDoS. I don’t mean to scare you, but DDoS attacks have been documented to cause “beaucoup” damage to organizations around the globe.

Benefits of using a VPN

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]

How surveillance is transforming these top six industries

How surveillance is transforming these top six industries

Surveillance is rapidly changing across the world, and the technology supporting it is getting pretty complex fast. Gone are the days of analog cameras and single-person control rooms. Today, effective surveillance spans an interconnected, intelligent ecosystem of high-definition imaging, multi-modal sensors, data-sharing networks, and powerful analytics—a combination resulting in insights derived from digital images and video, otherwise known as “computer vision.

Simplifying Surveillance in the Age of More

Simplifying Surveillance in the Age of More

More cameras, more sensors, more intelligence―today’s advanced video surveillance systems do more than ever before to protect people and property, with applications far beyond perimeter monitoring and access control.

However, as a recent IDC white paper points out, putting new surveillance technologies to work quickly gets complex.

5 proactive defenses against cyberattacks

5 proactive defenses against cyberattacks

As IT security consultants, we’re stuck between a rock and a hard place. Managed IT services providers (MSPs) such as ours want to provide clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most fundamental aspects of cybersecurity would most likely put you to sleep instead of […]

Modern Data Protection Provides Essential Support for Successful IT Transformation

Modern Data Protection Provides Essential Support for Successful IT Transformation

In the fourth of a series of blogs inspired by influential research published by industry analyst ESG, we learn how modern data protection strategies, tools and processes enable and support IT Transformation. 

Modernizing the IT environment is a fundamental step that companies of all sizes must take on their journey towards achieving IT Transformation – and that includes the implementation of modern data protection devices and processes.