Skip to content

Skyport Systems at RSA 2017: Active Directory Assessment Data Show Over 90% of Environments Likely Hackable

Hear what our customers are learning and sharing about securing Active Directory, and find out if your environment will stack up against the latest threats.

If you’re headed to RSA this year, here’s how to get in touch, so we can show you how to run your most business-critical applications safely.

This year’s RSA Conference, held in San Francisco, Calif., Feb. 13 to Feb. 17, is sure to be ripe with inspiring security innovation. With more than 45,000 individuals and 500 companies that participate in the conference each year, it’s a show not to miss, and Skyport Systems has quite a few things going on.

Check out the activities below and find one that works for you.

Continue Reading →

3 Hot Trends in Cybersecurity the C-Suite Is Talking About Right Now

computer-keys

Cybersecurity sometimes feels like a game of cat and mouse—new technologies and even familiar hacker capabilities are constantly testing protections, and requiring the security sector to put out and prevent potentially destructive attacks.

Today, we’ll look at three of the top issues in cybersecurity that the C-Suite is talking about right now, and suggest some ways you can prepare.

Continue Reading →

Your 2017 IT Security Checklist

Computer and Tablet

As we head into 2017, cybercriminals still have the advantage. This is despite the billions of dollars worldwide we sink into cybersecurity.

This is concerning—especially since most of the attacks we face are predictable. For example, there’s a lot of hype around hacking events (like blaming whole countries on them), but the truth is that most data breaches fall into common areas of attack.

(Get your instant download of the 2017 IT security checklist here, or keep reading for another chance to download later.)

Continue Reading →

5 Critical IT Security Questions You Need Answers to in 2017

Locked Gate

When you think about securing your IT environment, what’s top of mind? The answer is usually preventing data breaches and protecting critical data—intellectual property, information on people and so on.

When we look at the systems that need to be secured in order to protect those data sets, many often overlook Microsoft Active Directory.

Used by more than 90 percent of organizations, when Active Directory is compromised, attackers can gain access to the entire IT infrastructure. You may not realize it, but this application is currently under heavy attack because our adversaries know its value.

Let’s take a closer look at the five critical questions to ask about your IT security that you may not have thought of.

(For a deeper dive into this topic, check out a recent webinar on critical security questions CIOs are asking.)

Continue Reading →

Private Cloud, Take 2: Predictions for 2017

Clouds

While an industry-wide love affair with public cloud continues to rage, the goal of providing a parallel experience for on-premise IT remains unsatisfied.

What we have seen so far is a thin veneer on top of existing aging vendor offerings (VMware), and with OpenStack, a passionate community has been iterating an open source solution of self-service for developers. In both cases, the operations characteristics do not resemble public cloud at all, limiting the adoption.

Next year, a new definition of private cloud will evolve to create an operations-focused take on private cloud with three key characteristics.

Continue Reading →

1 2 10