Cloud Computing Security Myths

Busting Cloud Security Myths

Although far from new in technological terms, the ubiquity of public and hybrid cloud use is a relatively recent phenomenon. Driven in part by the current COVID-19 pandemic, it would be difficult to find an organization that isn't relying on a cloud-based service right now ... Read More
Hackers-Can-Compromise-Virtual-Desktop-Infrastructures

How Hackers Compromise Virtual Desktop Infrastructure

How do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops ... Read More
Cloud-Workload-Threats

Here’s What’s Driving the Rise In Cloud Workload Cyber Threats

Available anytime and capable of being run from anywhere, cloud computing provides a perfect solution to operational challenges posed by the COVID-19 pandemic. With public and hybrid cloud use rising across every sector, dramatically increased uptake of cloud technology quickly became one of the more benign changes brought about this ... Read More
virtual-desktop-infrastructure-remote-work

Virtual Desktop Infrastructure: Crucial in a Work-From-Home World

The coronavirus pandemic has forced companies to experiment with remote work in ways they never had before. For many, working from home was the only viable option for weeks or months due to mandatory shutdown orders and grave public health concerns. But that doesn’t explain why 74% of the CFOs ... Read More
Cloud workload security requires a proactive approach

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

The recent leap towards cloud computing has fast-forwarded digital transformation for countless organizations. What there hasn’t been, however, is a corresponding improvement in the ability of organizations to secure the cloud. In fact, as more companies rely on the cloud to maintain their operations, they also risk accruing a cybersecurity ... Read More
The shared responsibility model impacts cloud security

Cloud Workloads: How Does Shared Responsibility Affect Security?

Cloud migration continues at a brisk pace. As many as 94% of enterprises now use the cloud, and data suggests that by the end of 2020, only 27% of workloads will happen on-premises. For everything from data storage to critical applications, the cloud is the first and often the only ... Read More
FEATURED-VDI-Security-Tips

3 Tips for Better Virtual Desktop Infrastructure Security

The recent rise in remote working has up-ended the corporate IT landscape. In a matter of days, remote working went from a nice-to-have perk to necessity for millions of companies globally as countries continue to battle the COVID-19 pandemic. . To keep pace with changing business needs, organizations have embraced ... Read More
FEATURED-Advanced-Endpoint-Security-COVID-19

Advanced Endpoint Security in the New COVID-19 World

The term “new normal” means different things to different people. For some, the term is synonymous with a return to the office (just with a few tweaks), while others think that co-located teams are gone for good. The reality is probably somewhere in between. Household names like Google and Facebook ... Read More
FEATURED-Advanced-Endpoint-protection-COVID-19

Advanced Endpoint Protection in the New COVID-19 World

The term “new normal” means different things to different people. For some, the term is synonymous with a return to the office (just with a few tweaks), while others think that co-located teams are gone for good. The reality is probably somewhere in between. Household names like Google and Facebook ... Read More
Endpoint Security Needs to Improve

How Emerging Threats Outwit Existing Endpoint Security

In the ongoing war over cybersecurity, endpoints seemed like settled territory. After years of surrounding these vulnerable vectors with defensive technologies and company-wide IT hygiene best practices, it became easy to assume the endpoints were ironclad. Unfortunately, the latest generation of emerging threats handily circumvents and, in many cases, obliterates ... Read More