by Adam Myers | Aug 9, 2023 | Cloud, Cybersecurity, vCISO
#northsouth No cares about East-West ‘until’ they feel it? What you need to know about the top-5 differences between North-South and East-West Network traffic relating to Cybersecurity posture? 1. Communication Direction: Internal vs. External 2. Security...
by Adam Myers | Aug 9, 2023 | Cloud, Cybersecurity, SEC Compliance, vCISO
#mimecastSEG #sms2813985804whiteboard https://community.mimecast.com/s/article/email-security-cloud-gateway-data-centers-and-urls Email Security Cloud Gateway – Data Centers & URLs Mar 11, 2023•Knowledge Mimecast operates in multiple regions, each with its...
by Adam Myers | Aug 7, 2023 | Cloud, Cybersecurity, SEC Compliance, vCISO
#trustwaveblog sms#2813985804whiteboard The US Securities and Exchange Commission (SEC) adopted new rules for cybersecurity risk management, strategy, governance, and incident disclosure by public companies on July 26, requiring public companies to disclose material...
by Adam Myers | Aug 3, 2023 | Cloud, Cybersecurity
#toughcall When you rely on email service providers like Microsoft Azure, AWS, or Google Cloud to host your email, you are entrusting them with a portion of your business operations, including communications. It’s important to note that while you may not have...
by Adam Myers | Aug 2, 2023 | Cloud, Cybersecurity, SDWAN, TEM, Uncategorized, vCISO
Are your storage needs increasing faster than your on-premises storage can handle? We explain why cloud storage is actually the safer option – while also saving you money. Cybersecurity breaches are becoming more frequent and advanced than ever before, and can result...
by Adam Myers | Jul 31, 2023 | Cloud, Cybersecurity
Palo Alto & Cloudflare Co-Exist Here are the top 5 reasons to make your existing Palo Alto Security investment co-exist with Cloudflare: Palo Alto Networks and Cloudflare can co-exist within an enterprise environment by complementing each other’s...
by Adam Myers | Jul 31, 2023 | Uncategorized
Maersk Cybersecurity Breach History includes the specific details about the event, scope, impact and lessons learned. #sms2813985804whiteboardsession The Maersk cybersecurity breach occurred in June 2017 and was a result of the NotPetya ransomware attack....
by Adam Myers | Jul 31, 2023 | Uncategorized
EscalationVsIncidentResponse Here are the top 5 differences between an escalation list and an incident response list? An escalation list and an incident response list are both important tools used in different aspects of managing issues within an organization. Here...
by Adam Myers | Jul 31, 2023 | Uncategorized
#uemvsgateway Unified Endpoint Management (UEM) like VMWare’s WorkspaceONE and Gateway-based email filters (like Mimecast) are two distinct cybersecurity solutions that address different aspects of an organization’s security posture. Here are the top five...
by Adam Myers | Jul 25, 2023 | Uncategorized
#24×7 A Central Station is a specialized facility that provides 24/7 commercial and residential property monitoring and response services for various security systems. Its primary purpose is to ensure the safety and security of its customers by monitoring...