Enterprise Identity, Enterprise Security, Software Security

Dell PowerScale OneFS: Security Considerations

December 28, 2022

Dell PowerScale OneFS: Security Considerations
In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Spotlight

TBG Security

TBG provides a portfolio of services including security, compliance and continuity solutions. TBG helps professionals and executives in industries including: health care; banking, financial and insurance services; retail and consumer goods; business and technology services. TBG's customer driven approach to solving security compliance and continuity (SCC) problems is an unbiased approach that provides truly objective recommendations and solutions.

OTHER WHITEPAPERS
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More
news image

Quantum Readiness Toolkit: Building a Quantum-Secure Economy

whitePaper | June 29, 2023

Accelerating developments in quantum computing pose new challenges to cybersecurity. The rise of quantum computers has the potential to compromise existing cryptographic systems, putting secure communications and data protection at risk. Organizations must adjust security practices and governance to address the quantum threat.

Read More

Spotlight

TBG Security

TBG provides a portfolio of services including security, compliance and continuity solutions. TBG helps professionals and executives in industries including: health care; banking, financial and insurance services; retail and consumer goods; business and technology services. TBG's customer driven approach to solving security compliance and continuity (SCC) problems is an unbiased approach that provides truly objective recommendations and solutions.

Events