Key Takeaways from Verizonā€™s 2020 Data Breach Investigation Report

Verizonā€™s 2020 Data Breach Investigation Report (DBIR) is out and, as usual, provides some of the richest data available.

How Agio Securely Empowers Remote Users

Telecommuting isnā€™t new, but not every business thought it was right for them. Enter COVID-19: the virus that turned outdated thinking on its head.

Coronavirus: How to Do Business as Usual When Itā€™s Anything But

Hereā€™s how the most successful CTOs, CISOs, COOs, CFOs, and CCOs have been leading their organizations through the ongoing COVID-19 crisis.

How Has Your Business Continuity Plan Evolved as a Result of COVID-19?

COVID-19 came out of nowhere, set up camp, and put everyone physically and mentally at riskā€“not to mention stretching your business continuity plan beyond anything you planned for.

A CTOā€™s Guide to Fighting Remote Worker Cybersecurity Complacency

Hereā€™s a list of cybersecurity reminders you can share with your remote workforce to refresh their understanding of your firmā€™s cybersecurity expectations and their role in keeping the firm secure.

6 Components of an Optimized Azure Infrastructure

Building your Azure infrastructure is more than just providing virtual networks and machines; it requires careful thought, planning, and expertise.

Cybersecurity & Governance Framework Meet the Gold Standard

If your company has made it this far into the COVID-19 pandemic and is still healthy, itā€™s a good time to address any processes or practices youā€™ve been putting off.

The Rise of IoT Botnet Attacks

IoT botnet attacks are an increasing threat in an increasingly unsecured internet. These types of attacks will continue to rise in popularity as the ability to conduct them and the value of botnets rise.

Are Portfolio Companies Ready for Business as Usual?

Coming out of the height of COVID-19, how are portfolio companies moving forward? Most of them donā€™t have the resources in place to call out gaps in security as people return to the office.

5 Actions to Take Ahead of CCPA Enforcement

Enforcement of the California Consumer Privacy Act (CCPA) went into effect earlier this year to protect consumersā€™ personal information, including how itā€™s collected, stored, and shared.

When COVID-19 Spread, So Did Your Data. Hereā€™s How to Protect It.

As workers become more comfortable in their new remote routines, itā€™s important to ensure they donā€™t let their guard down when it comes to storing and sharing company information.

How to Spot Indicators of Compromise While Working From Home

The sooner you discover malicious activities, the easier it is to minimize damage or loss.