Data Security, Platform Security

Cybersecurity Technologies for Cloud Access

September 14, 2022

Cybersecurity Technologies for Cloud Access
The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Spotlight

Crypteia Networks, a PCCW Global company

Crypteia Networks, a PCCW Global company, delivers a patent-pending technology that identifies zero-day threats on their infancy along with misconfigurations on the already deployed defenses, as to provide visualizations of the threats paths and provide suggested mitigation actions (MOREAL™). This enables enterprises to add a new layer of security in their environment by expanding the intelligence of their already deployed security mechanisms, maximize the value of the logs they are already generating & collecting without any change in their infrastructure. The solution is non-intrusive, OS independent and comes with zero integration pains. Crypteia Networks is certified according to ISO 9001:2008 and ISO 27001:2005 as to offer best of class services. Crypteia Networks is headquartered in Athens, Greece with offices in Boston, MA.

OTHER WHITEPAPERS
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More

Spotlight

Crypteia Networks, a PCCW Global company

Crypteia Networks, a PCCW Global company, delivers a patent-pending technology that identifies zero-day threats on their infancy along with misconfigurations on the already deployed defenses, as to provide visualizations of the threats paths and provide suggested mitigation actions (MOREAL™). This enables enterprises to add a new layer of security in their environment by expanding the intelligence of their already deployed security mechanisms, maximize the value of the logs they are already generating & collecting without any change in their infrastructure. The solution is non-intrusive, OS independent and comes with zero integration pains. Crypteia Networks is certified according to ISO 9001:2008 and ISO 27001:2005 as to offer best of class services. Crypteia Networks is headquartered in Athens, Greece with offices in Boston, MA.

Events