security

An Enterprise Security Look Back and Look Ahead

Ron Temske, Vice President, Security Solutions, Logicalis US

For one of our first Enterprise Security blog posts of 2017, I thought I would reflect on some of the most significant events of 2016. I’ll stay away from predictions for 2017 since there’s no reason to create a documented record of how wrong I was!

Read more

How to Transform Internet Security with Big Data

Ron Temske, Vice President, Security Solutions, Logicalis US

How do you reduce gaps in visibility and coverage while mitigating remediation costs and breach damage? The answer: Take an Umbrella Approach to Security. In my earlier blog posts, I described how a starting point for enterprise connectivity to anywhere is the Domain Name Services or DNS. Then I described the benefits and just a few of the ways this umbrella approach to DNS can protect your enterprise environment.

Read more

Security Tips for Home Office and Small Office

Ron Temske, Vice President, Security Solutions, Logicalis US

It’s the holiday season when many people have been online shopping and sharing pictures, eCards and correspondence from home (and office). Maybe you’ve just received or given new mobile or wired devices that will connect with your home or small office network. In that case, you may be considering security – perhaps advanced security, given recent news of breaches, hacks and Internet of Things (IoT) malware.

Read more

What Would an Umbrella Approach to Security Look Like for Your Enterprise?
Part 1: Potential DNS Vulnerabilities

Ron Temske, Vice President, Security Solutions, Logicalis US

The starting point for enterprise connectivity to anywhere is the Domain Name Services or DNS. Why not start there for cybersecurity? The purpose of DNS is to resolve names, which humans can remember, into IP addresses used by computers and other connected devices. Comparing DNS to a phone book (Ed. For those of you old enough to remember them!), or your contact lists in Outlook or your phone, is a good analogy.

Read more

Advanced Threats Need a Next-Generation Approach to Cloud Security

By Jason Malacko

Let’s face it. Traditional security methods just aren’t up to the task of protecting organizational infrastructures and data from theft and ransomware. That’s a huge problem, because as organizations increasingly embrace a number of cloud-first platforms for everything from customer relationship management (CRM) to marketing automation platforms (MAP) to enterprise resource planning (ERP) platforms and beyond, they are increasingly at risk from malware and cybercrime that is more advanced and harder to thwart.

Read more

Page 1 of 1512345...10...Last »