5 Ways to Promote Cloud Migration Security

Cloud migration is a time of risk for company assets, such as data and applications. During migration, information may be lost or compromised because data is more vulnerable while in transit. Cybercriminals may take advantage of a move to the cloud to attack your company. Part of your migration planning process should be evaluating related […]

Blog Title Image Introducing In Firewalls we Trust Part 2

In Firewalls we Trust? – Part 2

What is defense in depth? In the previous article, I defined it as an approach to protection that involves layering a series of defense mechanisms to safeguard valuable data and information. Consider a factory setting: would the factory, receptionist, or factory workers allow anyone to walk in and roam freely? No, they wouldn’t, for reasons […]