Search Results for: security

IT and Security Teams Must Embrace Rapid Threat Containment

By Mike Johnson, Senior Cybersecurity Architect, Logicalis US

Most malware, phishing, exploits and ransomware threats are built to evade detection and response capabilities. This makes it a real challenge to build your defenses, contain the scope of the attacks and perform the appropriate fixes so you can get back to providing value to your business.

Read more

Is Managed Security the Answer to Surviving the Cybersecurity Talent Shortage?

By Ron Temske, Vice President, Security Solutions, Logicalis US

Most CIOs are well aware that there’s a significant shortage of cybersecurity professionals in the talent pool today. This becomes increasingly clear – and painful – for IT leaders within enterprise organizations as they are pressured from every side to bolster their companies’ security strategies and protect their digital assets.  A growing number of regulatory and compliance requirements coupled with demands from corporate boards of directors, shareholders and customers – particularly in the manufacturing and legal verticals where security questionnaires are being added as a requirement of doing business – is creating a demand for skilled, well-trained IT security specialists that simply cannot be filled.

Read more

Higher Education Requires Complex Compliance with Data Security Regulations

By Adam Petrovsky, GovEd Practice Leader, Logicalis US

Data breach, identity theft, credit card fraud and malware are top-of-mind challenges facing our digital, connected world.  Cybersecurity analysis, threat and identity management, intrusion prevention, and determining encryption standards are challenging topics – making security frameworks more complex and constantly changing.  For Higher Education organizations, these data security problems are magnified due to state and federal regulations.

Read more

It’s Time to Consider CIS Controls for Your Enterprise Security

By Ron Temske, Vice President of Security Solutions, Logicalis US

In previous blog articles, I’ve mentioned the Center for Internet Security (CIS), a nonprofit that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. We think very highly of their approach to cybersecurity, so much so in fact, that Logicalis recently became an Organizational Consulting Member of CIS because we recognize that its approach to security aligns very tightly with our own and supports our values. Here’s why we find CIS important and I think that you will as well.

Read more

Enterprise Security Blog: Ransomware

By Ron Temske, Vice President of Security Solutions, Logicalis US

Recent large-scale ransomware attacks have placed a premium on information about ransomware and what you can do to best protect your organization. Please note – ransomware attacks continue to spread, even as this blog is published, so new information may expand on (or contradict) what’s noted below. This post is current as of May 15, 2017.

Read more

Taking a Threat-Centric Approach to Security

By Ron Temske, Vice President of Security Solutions, Logicalis US

In an earlier article, Back to Basics: Risk-Centric Security Strategy  we discussed a Risk-Centric approach to enterprise security. Briefly, a Risk-Centric Approach to Security is very process-oriented. We discussed the steps used in identifying assets to protect and the level of risk assigned to these assets. Today, I want to take a look at a Threat-Centric Approach to Security.

Read more

Page 1 of 3812345...102030...Last »