Archive for

Author

Perspectives on Shadow IT

Posted: May 24, 2023

While sitting at our booth during a recent conference, a college student asked me a great question: “Is the impact of shadow IT on business good or bad?”  The question stemmed from a point made by one of the student’s instructors, which was that shadow IT is necessary for a business today to ...

Continue Reading

Help Prevent Data Breaches with SSE

Posted: April 26, 2023

Transitioning to SSE: Exploring Benefits and Addressing Challenges It's clear that the four major components of SSE (see Part 1 for details) play a crucial role in preventing data breaches and ensuring a robust security framework for your organization. Now, it's time to delve into the benefits of ...

Continue Reading

Help Prevent Data Breaches with SSE

Posted: April 20, 2023

Introduction Is there anything scarier than the idea of seeing your business making headlines as the victim of the latest data breach? Perhaps the price tag? According to the 2022 IBM Cost of a Data Breach report, 83% of organizations have had more than one data breach at an average cost of ...

Continue Reading

Ready, Set, Secure Episode 55

Posted: April 6, 2023
Category: Podcast

Click Here to watch or Here to listen This episode is brought to you by Secret Double Octopus In a perfect world security would be at the top of everyone’s mind, users would stay hyper vigilant, and everyone could access their critical systems without worry. Unfortunately, most users are simply ...

Continue Reading

Trace3 Acquires Set Solutions – Expanding, Strengthening Cybersecurity Capabilities

Posted: April 4, 2023
Category: Set Solutions

 Irvine, Calif. – April 4, 2023 – Trace3 announced it closed a transaction to acquire Set Solutions, an advanced cybersecurity consulting and procurement solutions provider headquartered in Houston, Texas.  Trace3’s acquisition of Set Solutions is a continuation of the company’s ...

Continue Reading

Autonomous Hacking Robots

Posted: April 3, 2023

Imagine a future in which robots exist that can autonomously perform end-to-end hacking campaigns, with zero human interference. These robots are not like the wormable malware that we’ve seen in the past, but instead, use advanced artificial intelligence to dynamically and adaptively wage war ...

Continue Reading

Launching your Active Directory environment into the cloud with Microsoft

Posted: March 30, 2023
Category: Video Series

Is your organization moving to cloud-based identity management using Microsoft native Azure AD offerings? Are you swimming through a sea of acronyms trying to sort it all out? Check out our latest video from Senior Security Consultant, Michael Morrison, to learn key concepts, capabilities, and ...

Continue Reading

Ready, Set, Secure Episode 54

Posted: March 23, 2023
Category: Podcast

Click here to watch or here to listen This episode is brought to you by Armis. Armis recently released the “State of Cyberwarfare and Trends Report: 2022-2023”. They surveyed over 6,000 IT and Security professionals from all over the globe to determine their sentiments on cybersecurity ...

Continue Reading

How Recent Changes In Identity Management Help Businesses To Better Secure Their Systems And People

Posted: March 16, 2023
Category: IAM

Organizations have invested considerably in their digital transformation initiatives. Analyst firms estimate hundreds of millions have been earmarked in recent years to move to cloud computing, digitize business processes, and improve customer experiences to stay competitive and relevant. It makes ...

Continue Reading

Ready, Set, Secure Episode 53

Posted: March 9, 2023
Category: Podcast

Click here to watch or here to listen Annie Jamshed is a VERY busy woman. When she’s not at her day job you can find her running the Houston Affiliate of WiCyS, working hard as the outreach director of CS2AI, or wrangling speakers for HouSecCon. In the middle of all of this Annie found time to ...

Continue Reading