Data Security, Platform Security, Software Security

Cloud Native Security Model

December 23, 2022

Cloud Native Security Model
Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Spotlight

Comodo

Comodo is a leading global provider of Digital Security, Identity and Trust Assurance services that include a comprehensive portfolio of High-Assurance Digital Certificates and Managed PKI solutions, eCommerce Acceleration, Authentication (Multi-Factor) and Network Vulnerability Scanning services certified for PCI Compliance reporting. Comodo Security Solutions, with over 15,000,000 endpoint installations of its threat prevention products, offers an extensive suite of security software and support services for businesses and consumers alike. Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. With offices in the US, UK, China, India, Romania and the Ukraine, Comodo secures and authenticates the online transactions and communications for over 200,000 business customers and millions of consumers.

OTHER WHITEPAPERS
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

Cisco Secure Email Buyer's Guide

whitePaper | October 20, 2022

Organizations continue to face a daunting challenge. Email is simultaneously the most important business communication tool and the leading attack vector for security breaches. The ubiquitous, and casual, use of email makes it the perfect avenue to deliver threat-centric content, insert malware into corporate systems, steal data, and extort money.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More

Spotlight

Comodo

Comodo is a leading global provider of Digital Security, Identity and Trust Assurance services that include a comprehensive portfolio of High-Assurance Digital Certificates and Managed PKI solutions, eCommerce Acceleration, Authentication (Multi-Factor) and Network Vulnerability Scanning services certified for PCI Compliance reporting. Comodo Security Solutions, with over 15,000,000 endpoint installations of its threat prevention products, offers an extensive suite of security software and support services for businesses and consumers alike. Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. With offices in the US, UK, China, India, Romania and the Ukraine, Comodo secures and authenticates the online transactions and communications for over 200,000 business customers and millions of consumers.

Events