Perspectives on Shadow IT
While sitting at our booth during a recent conference, a college student asked me a great question: “Is the impact of shadow IT on business good or bad?” The question stemmed from a point made by one of the student’s instructors, which was that shadow IT is necessary for a business today to ...
Continue ReadingHelp Prevent Data Breaches with SSE
Transitioning to SSE: Exploring Benefits and Addressing Challenges It's clear that the four major components of SSE (see Part 1 for details) play a crucial role in preventing data breaches and ensuring a robust security framework for your organization. Now, it's time to delve into the benefits of ...
Continue ReadingHelp Prevent Data Breaches with SSE
Introduction Is there anything scarier than the idea of seeing your business making headlines as the victim of the latest data breach? Perhaps the price tag? According to the 2022 IBM Cost of a Data Breach report, 83% of organizations have had more than one data breach at an average cost of ...
Continue ReadingReady, Set, Secure Episode 55
Click Here to watch or Here to listen This episode is brought to you by Secret Double Octopus In a perfect world security would be at the top of everyone’s mind, users would stay hyper vigilant, and everyone could access their critical systems without worry. Unfortunately, most users are simply ...
Continue ReadingTrace3 Acquires Set Solutions – Expanding, Strengthening Cybersecurity Capabilities
Irvine, Calif. – April 4, 2023 – Trace3 announced it closed a transaction to acquire Set Solutions, an advanced cybersecurity consulting and procurement solutions provider headquartered in Houston, Texas. Trace3’s acquisition of Set Solutions is a continuation of the company’s ...
Continue ReadingAutonomous Hacking Robots
Imagine a future in which robots exist that can autonomously perform end-to-end hacking campaigns, with zero human interference. These robots are not like the wormable malware that we’ve seen in the past, but instead, use advanced artificial intelligence to dynamically and adaptively wage war ...
Continue ReadingLaunching your Active Directory environment into the cloud with Microsoft
Is your organization moving to cloud-based identity management using Microsoft native Azure AD offerings? Are you swimming through a sea of acronyms trying to sort it all out? Check out our latest video from Senior Security Consultant, Michael Morrison, to learn key concepts, capabilities, and ...
Continue ReadingReady, Set, Secure Episode 54
Click here to watch or here to listen This episode is brought to you by Armis. Armis recently released the “State of Cyberwarfare and Trends Report: 2022-2023”. They surveyed over 6,000 IT and Security professionals from all over the globe to determine their sentiments on cybersecurity ...
Continue ReadingHow Recent Changes In Identity Management Help Businesses To Better Secure Their Systems And People
Organizations have invested considerably in their digital transformation initiatives. Analyst firms estimate hundreds of millions have been earmarked in recent years to move to cloud computing, digitize business processes, and improve customer experiences to stay competitive and relevant. It makes ...
Continue ReadingReady, Set, Secure Episode 53
Click here to watch or here to listen Annie Jamshed is a VERY busy woman. When she’s not at her day job you can find her running the Houston Affiliate of WiCyS, working hard as the outreach director of CS2AI, or wrangling speakers for HouSecCon. In the middle of all of this Annie found time to ...
Continue Reading