Data Security, Enterprise Identity

The Ethics and Security of Cloud Computing

October 17, 2022

The Ethics and Security of Cloud Computing
Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Spotlight

Perimeter 81

Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Cybersecurity: Experience and best practices during COVID-19 pandemic

whitePaper | July 6, 2020

With this white paper focused on the emerging cyber threat that we world is facing during the COVID-19 crisis, NETIA wish to share his experience, his initiatives and his knowledge on those topics.

Read More
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More

Spotlight

Perimeter 81

Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.

Events