When evaluating cloud solutions for a migration, enterprises often hear that either public or private cloud is superior, with little room for a more nuanced interpretation of the benefits and drawbacks of each. In many cases, one of these options will be more appealing in terms of the specific needs […]
Archives for January 2019
Running an Effective Phishing Simulation Exercise
You’ve run training seminars for several years that set aside ample time to talk about malware and all the ways it might infiltrate your systems. Running a phishing simulation to test your employees’ awareness and how quickly your security team responds can seem like a good idea, but many of […]
Deception and Response Techniques You Can Use
Enterprises are increasingly turning to deception tools to improve response time and provide more effective solutions. While providers may have different approaches, and open source options may differ in terms of both breadth and depth of the coverage they offer, you can access some universal applications for detection and response. […]
Assessing the Broader Value of Cloud Transformation: Why Businesses Should Invest
Cloud solutions have been on the scene for over a decade, maturing and evolving to serve enterprises that tap into the technology for driving business objectives. For many businesses, cloud transformation has yet failed to occupy a central position as a major priority. Some companies may shift a few workloads […]