Our top industry experts weigh in on topics that could affect you and your organization

  • GDPR What to Expect in the Coming Months

    Posted on October 13, 2017 by John Gilda

    The General Data Protection Regulation (GDPR) is a new European data privacy regulation that will be fully enforced from on May 25th, 2018, after being ratified in April 2016. The time period between the two dates was designed to be the grace period for companies to use to be fully compliant by the due date.

    GDPR is also designed to be a privacy regulation that has more consideration for the data subject (you and me) rather than the business. Learn More

  • Phishing your way Past Multi-Factor Authentication

    Posted on July 24, 2017 by Charles Worrell

    Let’s say an attacker gains access to a valid set of employee credentials. If you don’t have multi-factor authentication (MFA) in place, the attacker has hit the jackpot. They can quickly authenticate against any publicly available asset that accepts the compromised username and password.

    But what if you do have MFA in place? You have a federated single-sign-on portal as the gatekeeper to your sensitive public assets, and it’s protected with MFA. Learn More

  • The Trouble with Meeting Compliance

    Posted on June 22, 2017 by Anthony Dickenson

    Meeting compliance is vital for organizations across all industries — but it’s a mistake to think that compliance equals security for your network and your data. While regulations are improving all the time, IT managers and the C-suite too often believe that checking all the boxes required by regulators will ensure their organization will pass an audit or be 100% protected from a breach. Learn More

  • Reduce Cost and Recovery Time with Cloud Based Disaster Recovery

    Posted on April 27, 2017 by TUV NA Admin

    The emergence of the Public Cloud is breathing new life into an old problem; delivering a meaningful disaster recovery solution at an affordable price. Historically, organizations have had the choice of pursuing disaster recovery contracts with service providers or maintaining a secondary data center/colocation facility for disaster recovery purposes. Learn More

  • Ensure Weak Identity Assurance Isn’t Hurting Your Investments in Strong Authentication and Leaving You Exposed to Cyber-Attack

    Posted on April 11, 2017 by Mark Coderre

    The weakest link in the identity chain is moving from authentication to identification, a shift typical of compliance driven programs emphasizing authentication, and recognized by the newly drafted National Institute of Standards and Technology (NIST) eAuthentication standard. NIST 800-63-A, B, & C guidelines establish identity enrollment, proofing, authentication, and federation guidelines. Learn More

  • Accelerate Your Digital Transformation in the Cloud

    Posted on March 2, 2017 by TUV NA Admin

    As organizations look to expand the use of public cloud platforms such as Amazon Web Services (AWS) and Microsoft Azure, they face many obstacles. The biggest obstacle is often the lack of a centralized, secure connectivity architecture that is required to interconnect clouds and data centers. This approach, enables cloud applications to communicate with applications in different cloud deployments as well as with resources on the corporate network. Learn More