Infosecurity Blogs
The NSA EPL: The Policy that Protects Your Data
Why the NSA EPL has the specifications that ensure all data has a proper end-of-life solution
Protecting Your New Home In The Cloud
With the proper security strategy and solution, you can transition to the cloud smoothly and confidently
Cybersecurity, GRC and Auditing Intelligent Systems
ML models and their outputs must, at every single stage, be explained in a way that is interpretable or understandable to an average person
Classification Breakdown: Match Your Data to its Destruction Method
Whether destroying personally identifiable or top secret information, adopt proper data sanitization
Improving Security for Amazon S3 Buckets
Avoid post-deployment headaches by increasing the security of your Amazon S3 buckets
The New MFA To Secure All Employees In A Hybrid World
SIM authentication is cryptographically secure, easy to implement, and effortless to use
Why Data Centers Need to Know About GLBA Compliance
Under GLBA there must be a plan and personnel in place to oversee data destruction when data has reached its end-of-life
Streamline Scanning and Encryption of Objects in S3 Buckets
Organizations need cloud-native security that helps them meet compliance requirements and protect their cloud ecosystem
Mitigating Cybersecurity Risks of Mergers and Acquisitions
A carefully developed plan for identity and access management is essential to keep cyber attackers at bay
Hybrid Attacks Are Threatening Hybrid Work Through the Cloud
The novelty of conducting business through the cloud is exposing users to hybrid phishing attempts
5 Ways to Secure Amazon S3 Buckets
Five critical areas that newcomers should pay attention to when migrating to the cloud
Data Security in an Unsecure World
To adequately protect data, end-of-life drives must be disposed of properly
How to Decide Best Migration Path from Exchange to Office 365?
Why cutover and hybrid migrations are the most preferred options
Start Early and Secure Containers Across Their Lifecycle
While containerization increases application deployment speed, it opens up a new range of security risks
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
To guarantee data is wholly obliterated, it must be destroyed in-house with adequately rated equipment
Tales from the SOC: A Major Office 365 Compromise
A SOC analyst team reveal detail a recent Office 365 cyber incident, and how the threat was mitigated
SQL Server Disaster Recovery: Key Considerations
Define the success metrics, choose a backup strategy and leverage SQL availability features
A 10-Step Best Practice IAM Guide for Azure and AWS
Cloud providers like Amazon Web Services and Microsoft Azure have several crucial options for IAM policies
The Role of Active Directory in a Layered Security Strategy
How securing AD factors into preventing, detecting and responding to attacks
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Companies with proper data security and end-of-life data destruction methods pay significanty less