Over the past year, DataEndure’s TECH talks have covered a wide range of topics related to cybersecurity–from emerging industry trends, the economy, best practices, and more. Looking back at viewership across all our broadcasts, three features stood out distinctively from the rest–and not surprisingly, they are interrelated. With polymorphic malware responsible for many initial intrusions, it is understandable why viewers wanted more education on why their current antivirus/endpoint detection tools… Read More
I Get by with a Little Help from my Friends
For those of you who were around in the late 90s, the Managed Service Provider (MSP) concept was in its infancy. While the concept was simple–create and act as a centralized IT environment and offer it to multiple companies to leverage on a consumption basis–trusting the model, and therefore adoption, took time. Fast forward to today, and MSPs have become second nature. MSPs are in a unique situation, able… Read More
How to operate in a growing distributed environment
The holidays are upon us, and while it’s prime time for shopping… it’s also prime time for cyber adversaries. The target-rich environment of email offers, social selling and digital payments provides perfect cover for bad guys. 93% of attacks continue to originate through email… even with all the tools and training available. And it only takes one click to create a ransomware situation. It’s easy to think of this as… Read More
Microsegmentation: Defense against unseen mines in your network
I proudly served in the US Navy for the better part of 14 years. The first ship I served on was the USS Missouri (BB-63) as a Hospital Corpsman. During my time aboard, we deployed to the Persian Gulf as part of the battle contingent for Operation Desert Storm. Whenever a ship enters a potentially dangerous situation, the Captain orders, “General Quarters, set condition Zebra.” Condition Zebra means that every doorway on… Read More
“Is anybody out there??? ….”
Tech and security vendors galore hype AI… their “holy grail” message focusing on the transformational benefits of automation. Well, yes and no. In my experience at DataEndure, when Murphy’s law strikes–and it will–in the form of a data breach, ransomware, or outage… our clients aren’t reassured because they have automation in place–they are relieved because they have PEOPLE they know and trust responding with the level of urgency their situation… Read More
Considering an upgrade to VMware vSphere 7?
Originally posted on LinkedIn by DataEndure Sr. Solutions Engineer, Raj Patel. The growing demand for rapid delivery of innovative applications is driving the need for organizations to modernize how they develop and manage not only applications, but also the infrastructure they run on. This has led many to explore an upgrade to VMware vSphere 7 for the scalability, increased built-in security, high performance and rapid self-service access. Another important datapoint, technical guidance… Read More
Network Resiliency vs. Network Security – What’s the Big Deal?
There is a risk of becoming so focused on security controls and tools, businesses can neglect a key area of vulnerability and risk – the network. Conventional enterprise network architectures have not been designed and built for the dynamic and diverse deployment scenarios we face today. While network resilience has been the focus for most tech leaders; the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative… Read More
Considerations of the Modern Network
The past two years have seen radical changes in the way we use the network. Seemingly, in the blink of an eye, we have gone from an in-office, centralized and controlled network to a fully or near-fully distributed model. The pandemic revealed the practicality, problems, and needs of a remote workforce. We also learned that the workforce largely prefers the remote model over the in-office models of the past. As… Read More
3 Ways to Maintain Security in Economic Uncertainty
There are indicators that the economy might be in for a bumpy ride for the foreseeable future. Many businesses are already starting to plan for this uncertainty, plot strategies for reduced cash flow and decreased demand, and propose operational changes to be in the best position to weather the storm. Critical to these conversations are prioritizing areas of the business that can’t be dialed back. Security is absolutely one of… Read More
Don’t Be the Next Victim: 3 Critical Layers for Protecting Against Polymorphic Malware
As if cyber-defense wasn’t difficult enough – try battling malware that constantly changes its identifiable features in order to evade detection. Polymorphic malware isn’t new; the first polymorphic virus dates back to 1989. But fast-changing polymorphic malware now makes up 97% of the malware organizations face – updating itself with new definitions every few days, mutating faster than traditional security systems can keep up and making previous detection signatures obsolete. There are… Read More
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 12
- Next Page »