Before the arrival of the “cloud,” cybersecurity used to be relatively simple. A simple firewall to secure the network… some antivirus software to keep PCs in the office safe from various forms of malware… and that was about it. #-ad_banner-#Today, partly thanks to the cloud, the “company network” as it were, is amorphous. Throw in the proliferation of various types of mobile devices, as well as an increasingly mobile workforce, and it becomes clear that basic firewalls aren’t up to the task. Securing these endpoints has become a much more challenging endeavor. The benefits of the cloud are clear (efficiency,… Read More
Before the arrival of the “cloud,” cybersecurity used to be relatively simple. A simple firewall to secure the network… some antivirus software to keep PCs in the office safe from various forms of malware… and that was about it. #-ad_banner-#Today, partly thanks to the cloud, the “company network” as it were, is amorphous. Throw in the proliferation of various types of mobile devices, as well as an increasingly mobile workforce, and it becomes clear that basic firewalls aren’t up to the task. Securing these endpoints has become a much more challenging endeavor. The benefits of the cloud are clear (efficiency, mobility, and cost savings, just to name a few). Still, no company wants to be in the headlines for a costly security breach. This means any critical applications and business-critical data stored on the cloud will require security controls not covered by security measures designed purely for on-premises deployments. That means big-time opportunity for companies offering innovative solutions in the cybersecurity space. One Of Our Top Cyber Picks One particular area that’s ripe for cyber companies is with what are known as “privileged accounts.” These special accounts are what the IT folks at any business use to log in… Read More