A Layered Approach to Cybersecurity: People, Processes, and Technology

A Layered Approach to Cybersecurity Many think of a layered approach to cybersecurity in terms of technology and tools. This means having various security controls in place to protect separate entryways. For example, deploying a web application firewall, endpoint protections, and secure email gateways, rather than relying only on traditional perimeter Continue Reading

Rise of the Funnel Cloud: When Good Clouds Go Bad

What is a cloud, really? In the simplest terms, the cloud allows users to store and access data and programs on someone else’s hardware, usually over the internet, rather than using their local device or network resources. But it is much more than simply offsite storage. It also includes services that Continue Reading

>