Connecting the Dots

by Jasmine Chennikara-Varghese With billions on the line, organizations have been aggressively protecting critical data against rogue users and devices. While best practice security measures dictate the need for identity and access management, server hardening and...

Dealing with a Data Breach

by Jasmine Chennikara-Varghese What keeps you up at night? Is it the thought that despite the security measures you put in place, there are threat actors out there aggressively plotting to bypass those measures, exploit vulnerabilities or obtain stolen credentials to...

Bridging the Gaps in Cyber Defense

by Jasmine Chennikara-Varghese There has been an influx of solutions over the past few years to secure protected assets and data. Best practices have evolved requiring companies to adopt a variety of these security solutions including web proxies, firewalls, intrusion...