Skip to content
Our Portfolio: Tech Speak for the Non-Geek
How to Choose An Intrusion Detection System

How to Choose An Intrusion Detection System

The recent zero-day attacks on SolarWinds and more than 100 other businesses and nine government agencies spell it out as never before: every enterprise needs an intelligent, application- based intrusion detection system (IDS).

Read more
Which is the Right IDS for You?
Blog posts, Content Marketing, CyberCrypt, Cybersecurity

Which is the Right IDS for You?

Where to place an intrusion detection system (IDS) is an important rst question, but it’s far from the last decision you’ll make as you work to protect your enterprise from zero-day attacks like SolarWinds.

Read more
Cyber Speak for the Non-Geek: Cybersecurity Writing Mistakes to Avoid
Cybersecurity, Videos

Cyber Speak for the Non-Geek: Cybersecurity Writing Mistakes to Avoid

Cybersecurity is sexy! Sherry Jones, internationally best-selling author and CEO/President of CyberSmart Writing, reveals to Alcon Maddox's Richard Richie her…

Read more
The Right Time to Hire a Security Analyst
Articles, Blog posts, Content Marketing, Cybersecurity, Privacy, Risk management, Technology, Thought leadership

The Right Time to Hire a Security Analyst

The Right Time to Hire a Security Analyst December 14, 2020 A doll that understands what children say and responds…

Read more
Jump-start your cloud adoption with modern cloud security
Articles, Content Marketing, Cybersecurity, PricewaterhouseCoopers, Privacy, Thought leadership

Jump-start your cloud adoption with modern cloud security

Jump-start your cloud adoption with modern cloud security Why your enterprise cloud transformation strategy may be stuck, and what to…

Read more
Does your customer identity and access management (CIAM) inspire trust?
Articles, Content Marketing, Cybersecurity, PricewaterhouseCoopers, Privacy, Technology, Thought leadership

Does your customer identity and access management (CIAM) inspire trust?

"People expect easy and convenient online shopping that’s secure, private, efficient and smooth, even when they’re using multiple devices. They want ads and promotions that speak to their wants, needs and lifestyles. And, increasingly, they want control of their personal information. Using a CIAM solution helps businesses meet these needs without having to build the features themselves."

Read more
Taking the ‘Risk’ Out of Vendor Risk Management
Case studies, Content Marketing, Privacy, Reciprocity, Risk management

Taking the ‘Risk’ Out of Vendor Risk Management

Monitoring vendor risks and risk-mitigation efforts can be challenging, especially for an organization using spreadsheets to track many different entities at once. Using a quality, well-designed governance, risk and compliance software such as ZenGRC can greatly simplify the task, as international pharmaceutical wholesaler AmerisourceBergen recently discovered.

Read more
Corporate boards need more members who ‘get’ cybersecurity
Articles, Cybersecurity, Kaspersky, Thought leadership

Corporate boards need more members who ‘get’ cybersecurity

Company boards need to know enough about cybersecurity to govern effectively, but four in 10 boards admit they should know more. One way to learn: invite a cyber expert to meetings.

Read more
Privacy is dead. Long live privacy!
Articles, Kaspersky, Privacy

Privacy is dead. Long live privacy!

Almost every new technology is said to have finally killed privacy. One thing’s for sure: Regulation alone can’t keep our personal data safe.

Read more
Back To Top