Posted on June 22, 2017 by Anthony Dickenson
Meeting compliance is vital for organizations across all industries — but it’s a mistake to think that compliance equals security for your network and your data. While regulations are improving all the time, IT managers and the C-suite too often believe that checking all the boxes required by regulators will ensure their organization will pass an audit or be 100% protected from a breach. Learn More
Posted on April 27, 2017 by TUV NA Admin
The emergence of the Public Cloud is breathing new life into an old problem; delivering a meaningful disaster recovery solution at an affordable price. Historically, organizations have had the choice of pursuing disaster recovery contracts with service providers or maintaining a secondary data center/colocation facility for disaster recovery purposes. Learn More
Ensure Weak Identity Assurance Isn’t Hurting Your Investments in Strong Authentication and Leaving You Exposed to Cyber-Attack
Posted on April 11, 2017 by Mark Coderre
The weakest link in the identity chain is moving from authentication to identification, a shift typical of compliance driven programs emphasizing authentication, and recognized by the newly drafted National Institute of Standards and Technology (NIST) eAuthentication standard. NIST 800-63-A, B, & C guidelines establish identity enrollment, proofing, authentication, and federation guidelines. Learn More
Posted on March 2, 2017 by TUV NA Admin
As organizations look to expand the use of public cloud platforms such as Amazon Web Services (AWS) and Microsoft Azure, they face many obstacles. The biggest obstacle is often the lack of a centralized, secure connectivity architecture that is required to interconnect clouds and data centers. This approach, enables cloud applications to communicate with applications in different cloud deployments as well as with resources on the corporate network. Learn More
Posted on February 1, 2017 by Seth Art
The weakest link in the identity chain is no longer authentication; it has moved!
The identity chain has many links (Identify, Provision, Authenticate, Federate, Manage, De-Provision), and for years the reliance on passwords has made authentication the weakest link. The use of passwords for user authentication is often the one piece of the cyber security system whose creation and safety is left in the hands its users; rather than being entrusted to its designer and administrators. Learn More
Posted on September 2, 2016 by Mark Coderre
Incident Response drills shouldn’t be viewed as overhead, or a discretionary spend, because a poorly executed response to a cyber security incident translates to material financial, regulatory, and reputational costs for your organization.
Effective incident response requires preparation; this includes not only preventing incidents, by ensuring that systems are secure, but also establishing an incident response capability so that you’re confident your organization is ready to respond. Learn More