How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
The GDPR is in effect and being enforced, and yet there are still so many questions as to how the new data protection regulation in the EU is going to influence how businesses approach the securing and processing of personal data of EU residents.
Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT.
In this podcast, Ipswitch's Director of Global Alliances, John McArdle, discusses a new and powerful integration within Ipswitch's network monitoring tool, WhatsUp Gold.
It's conference season, and we're right around the corner from two of the biggest InfoSec conferences in the world: BlackHat and DEF CON. In this episode of Defrag This our fearless hosts discuss their preparations for the hacker cons, what they're looking forward to,...
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...