How to get cloud migration right
If you want to get cloud migration right, you must deal with an inconvenient truth: Cloud or hybrid cloud environments lower the drawbridge between your data center and the …
For adapting to new cloud security threats, look to “old” technology
With remote work and reliance on cloud computing here to stay, it’s no surprise how many headlines there are to address the growing cloud security concerns in our industry. …
Risky business: 3 timeless approaches to reduce security risk in 2021
Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an …
BlueCat Adaptive DNS gives network teams visibility over AWS resources and threat protection
BlueCat announced enhancements to its Adaptive DNS platform that give businesses coping with sudden and profound changes in their network greater control, visibility, and …
DNS over HTTPS’ threat to enterprise security
DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For …
How to start achieving visibility in the cloud
As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On …
How DNS firewalls can burn security teams
It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …
How internal dysfunction puts your network at risk
IDG polled 200 network and cybersecurity professionals across the U.S. & Canada, and found almost inevitable consequences for organizations where network and …