Category: Vendors
How companies can lessen financial impacts through DX and technology
The ‘new normal’ I’ve been chatting with many colleagues over the last few months as I learn more about digital transformation (DX) and work on DX assets for Micro Focus. […]Combating the Threat Landscape in the Public Sector
Combating the Threat Landscape in the Public Sector POSTED BY ANTHONY PERRIDGE 2019 saw a significant rise in ransomware attacks on public sector targets. Specifically, these attacks have been targeting […]Top 5 Reasons Why Your Healthcare Organization Should Use Wireless Technology
Technology has transformed the way healthcare providers practice and care for patients. For instance, electronic medical record-keeping no longer requires physically connecting a computer to a hospital or healthcare system’s […]Secure Hybrid Access to Forcepoint Products with Azure Active Directory
Security products then started adopting standard identity protocols (e.g. RADIUS, LDAP) to enable central access and role management within their products using traditional user directories, but these technologies are now […]A new way of working reduces delays and eases suffering
With a commitment to social transformation, the South African Department of Social Development (DSD) endeavors to provide a better life for the poor, vulnerable and excluded in society. Tasked with […]Sizing Up: How Mandiant Evaluates Ransomware Defense
Organizations across various regions, industries, and sectors have identified ransomware as a significant risk and wonder if they are positioned to successfully detect and prevent a ransomware attack. At FireEye […]I think, therefore I modernize: introducing Enterprise Suite 6.0
I need to change – IT needs to change Rapid and large-scale IT change is a very costly exercise…. View Article (Feed generated with FetchRSS) This post was first first […]Popular Techniques Used by Cybercriminals Amid COVID-19
(Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly leverage fear and confusion by launching cyberattacks during major world events. Such attacks areWhat to Expect from the Next Generation of Secure Web Gateways
While secure web gateways (SWGs) have operated on a far more compressed timetable, a similarly drastic evolution has taken place. SWGs are still largely focused on ensuring users are protected […]Clouds Are Secure, Are You Using Them Securely?
Cloud technology isn’t new, but it’s still unfamiliar ground for many organizations. As if migrating to the cloud wasn’t already a massive undertaking, the added responsibility of integrating a comprehensive […]Load More