This is the first in a series of blog posts examining a cloud-based enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a cloud-based model. The two dominant themes in enterprise architecture today is the desire to save money by utilizing cloud services and threat of state-sponsored cyberattacks. The goal of a Secure Enclave is to help … [Read more...] about Secure Enclaves: Foundation For The Cloud-Based Enterprise
Planning, deploying and operating a cybersecurity architecture is difficult because it requires understanding of different disciplines. The key to having a functional security architecture is integrating identity, access control, endpoint protection and file encryption systems together (across data center and cloud environments). The importance of getting everything right is … [Read more...] about Maximize The Value Of Your 2018 RSA Show Visit
On March 21, 2018 the New York Times reported that the White House was going to take aggressive action against China for illegal trade practices as well as intellectual property theft. The administration is right to do so. Drive thru middle America and you’ll see closed factories whose products are now manufactured in China. For the past few decades China has implemented an … [Read more...] about White House Takes Action Against Chinese Intellectual Property Theft
Recent actions by DHS signal a closer monitoring of technology being purchased by the U.S. government, especially technology created and or controlled by foreign governments. In some cases Internet-connected products controlled by foreign governments have already been banned, and there are indications more may be coming. For cybersecurity personnel the product bans will require … [Read more...] about Internet-connected Product Bans: How Do You Avoid Future Issues?
How can we improve cybersecurity? How can we reduce risk? These are great questions. As long as cybersecurity is viewed as a pain, it’ll never be integrated into the fabric of an organization. Fortunately, there have been significant advances in cloud-based security services that enable new ways to embed cybersecurity into enterprise services people want. Ever wonder why … [Read more...] about 2018 Goal: Re-position Cybersecurity As An Enabler