automation multifactor authentication

Cloud Automation Key to Future-Proofing Cybersecurity

Organizations are turning to cloud automation to help them future-proof cybersecurity plans, particularly when coupled with autonomous privileges and access. These were among the results of a Delinea survey of 300 IT ...
Security Boulevard
cybersecurity executive order threats nation-state NAC

NAC: Usability and Security for Users

Using NAC, organizations no longer have to choose between security or usability on their networks It’s easy to assume that making something more secure automatically makes it more difficult to use. After ...
Security Boulevard
Uptycs Lacework Palo Alto CNAPP cloud security misconfiguration multi-cloud security Cloudflare cloud disaster recovery DR security

Who’s Responsible for a Cloud Breach? It Depends

The Cloud Security Alliance (CSA) released a survey earlier this year that focuses on who should take responsibility for breaches in the cloud. It’s a good question. The advent of hybrid IT, ...
Security Boulevard
Resetting Client Device Management

Resetting Client Device Management

Data is like water.  It ends up flowing freely through devices and cloud services like water down a river.  And users are bringing in an evolving group of devices and using more ...
Addressing Bring Your Own Technology

Addressing Bring Your Own Technology

How to implement a Bring Your Own Technology strategy is still one of the most rampant conversations we have everyday with businesses.  There is no single technology that is going to make ...
Why most NAC deployments fail

Why most NAC deployments fail

Network Access Control.  Another somewhat ambiguous yet ubiquitous security term floating around for a decade.  The principle of NAC is legit.  The goal is to make sure only authorized users and devices ...