Cyber Security

The Cyber Security ‘Perimeter:’ Has It Simply Vanished?

cshub.com

According to Cyber Security Hub, the concept of a cyber security perimeter intrigues security experts, who have long fought against emerging malware strains and external threats to fortify a network’s interior. Today, is a castle-and-moat strategy a thing of the past?

Read More
Addressing Challenges

Addressing The Challenges of Moving Security to the Edge

securityweek.com

An article in Security Week notes that for many organizations, the network perimeter has been replaced with a variety of new network edges. Many have specific challenges that can severely complicate an organization’s ability to maintain a consistent and manageable security infrastructure. These security challenges are two-fold.

Read More
New Year New Technology

New Year, New Technology: Law Firms Turning to Cloud Technology for Increased Data Security

law.com

“Law firms house a great deal of sensitive client information and are understandably concerned about the IT security of any technology solution they implement. However, many firms still think that legacy on-premise IT solutions are the most effective way to safeguard client data. The fact is that maintaining a secure on-premise IT solution is costly and complex,” according to Travis Howe, CISO of Litify.

Read More