For those of you who were around in the late 90s, the Managed Service Provider (MSP) concept was in its infancy. While the concept was simple–create and act as a centralized IT environment and offer it to multiple companies to leverage on a consumption basis–trusting the model, and therefore adoption, took time. Fast forward to today, and MSPs have become second nature. MSPs are in a unique situation, able… Read More
How to operate in a growing distributed environment
The holidays are upon us, and while it’s prime time for shopping… it’s also prime time for cyber adversaries. The target-rich environment of email offers, social selling and digital payments provides perfect cover for bad guys. 93% of attacks continue to originate through email… even with all the tools and training available. And it only takes one click to create a ransomware situation. It’s easy to think of this as… Read More
Network Resiliency vs. Network Security – What’s the Big Deal?
There is a risk of becoming so focused on security controls and tools, businesses can neglect a key area of vulnerability and risk – the network. Conventional enterprise network architectures have not been designed and built for the dynamic and diverse deployment scenarios we face today. While network resilience has been the focus for most tech leaders; the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative… Read More
Don’t Be the Next Victim: 3 CRITICAL LAYERS FOR PROTECTING AGAINST POLYMORPHIC MALWARE
As if cyber-defense wasn’t difficult enough – try battling malware that constantly changes its identifiable features in order to evade detection. Polymorphic malware isn’t new; the first polymorphic virus dates back to 1989. But fast-changing polymorphic malware now makes up 97% of the malware organizations face – updating itself with new definitions every few days, mutating faster than traditional security systems can keep up and making previous detection signatures obsolete. There are… Read More
Announcing eSCV: DataEndure SOC/MDR Service Enhancement
Based on the continuously increasing and evolving threat landscape, we are excited to announce a significant enhancement to DataEndure’s SOC & MDR offerings with the addition of eXtended Security Controls Validation & Vulnerability Scanning (eSCV). With cloud expansion at an all-time high, eSCV will afford customers the same peace of mind about the security of their external and cloud assets as they have with our internal Security Controls Validation, included… Read More
Cyber Resilience Isn’t Enough: The Three Layers of Infrastructure Resilience
Resilience is a hot topic these days, and for good reason. With our hyper-dependency on data and access, there is a very low tolerance for error or disruption, and the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative target for adversaries. Cyber Resilience includes elements like endpoint protection, firewalling, advanced phishing, email protection and DNS defense – all working together to ensure a fortified security posture. Yet… Read More
Top 3 Security Priorities for 2022
Over the course of any given year, we will have thousands of conversations with IT leaders about infrastructure and cyber-resilience. As we enter 2022, there were 3 Top Priorities organizations seemed to be talking about that we thought were important enough to share. In fact, we discussed this same topic in our December 2021 TECH talk which you can watch here. With our unique position as a solution integrator and… Read More
When Comparing MSPs and MSSPs, its all about Security
As organizations look for help managing their technology, there are a wide and growing number of choices. The Managed Service Provider (MSP) market is booming as are Managed Security Service Providers (MSSP). For consumers, this is good news / bad news. The good news – you have a lot of choices. The bad news – it is very hard to differentiate between all of the choices. The focus of an MSP… Read More
DataEndure’s New White Paper Takes a Closer Look at Zero Trust
Ponemon’s Cost of a Data Breach Report was recently updated for 2021, and notably, 65% of organizations said they do not have Zero Trust implemented. And of those, 43% have no plans to deploy it. Given how convoluted the topic of Zero Trust can be those statistics aren’t particularly surprising. Yet given the security threats we face today and the changing nature of the enterprise, Zero Trust is a critical… Read More
Considering Development? Consider Security.
Originally posted on LinkedIn by DataEndure Cloud and Data Science Practice Manager, Scott Stephenson. More and more organizations are engaging in software development. The reasons for doing so are diverse: providing a service interface for a legacy system, creating operations scripts to automate IT tasks, or even building entire SaaS services, software tools, or products. Organizations that may have never considered software development now find they need to engage in… Read More
- 1
- 2
- 3
- …
- 5
- Next Page »