Security

September 17, 2019

RPA security best practices include access control, system integration

Robotic process automation involves the use of bots, machine learning and AI to interact with business processes, taking people (mostly) out of the equation. While RPA […]
September 10, 2019
3 key questions to ask about unified communications security

3 key questions to ask about unified communications security

Keeping a unified communications environment secure is no small task as the different communications tools that comprise a UC system have their own security needs. And […]
September 6, 2019

Trustwave security platform provides visibility, control

Trustwave has launched Trustwave Fusion — a cloud-based cybersecurity platform that aims to connect enterprises and government agencies to a security cloud comprising the Trustwave data […]
August 29, 2019
Salesforce DNSSEC project aims to boost site security, speed, uptime

Browse the best email security products for your enterprise

It’s been a long time since the introduction of email to the corporate communication structure, but just because it’s been around forever doesn’t mean it’s safe […]
August 29, 2019

How SD-WAN security can boost your network security strategy

Realistically, networks cannot exist without network security. Yet, most organizations don’t have a significant budget or dedicated staff to accommodate their security needs. Many organizations — […]
August 23, 2019
Carbon Black acquisition bolsters VMware's security play

Carbon Black acquisition bolsters VMware’s security play

VMware is continuing a string of acquisitions with the purchase of Carbon Black, an endpoint security company, with the aim of providing more secure cloud offerings. […]
August 21, 2019
Salesforce DNSSEC project aims to boost site security, speed, uptime

Salesforce DNSSEC project aims to boost site security, speed, uptime

Salesforce and domain name system provider NS1 are working together on pushing encryption deeper into DNS to foil hackers and foster data privacy compliance. The initiative, […]
August 16, 2019
DevOps security checklist requires proper integration

DevOps security checklist requires proper integration

Developers often see security as a drag on software projects, both in terms of time and budget. Time is a particularly critical component in modern continuous […]
August 9, 2019

ICS security threats rising, targeting oil and gas facilities

LAS VEGAS — Cyberattacks against global oil and gas facilities are increasing, and the threats could have catastrophic results, according to new research. In a report […]
(303) 647-4050