Skip to content

Your 2017 IT Security Checklist

Computer and Tablet

As we head into 2017, cybercriminals still have the advantage. This is despite the billions of dollars worldwide we sink into cybersecurity.

This is concerning—especially since most of the attacks we face are predictable. For example, there’s a lot of hype around hacking events (like blaming whole countries on them), but the truth is that most data breaches fall into common areas of attack.

(Get your instant download of the 2017 IT security checklist here, or keep reading for another chance to download later.)

Continue Reading →

5 Critical IT Security Questions You Need Answers to in 2017

Locked Gate

When you think about securing your IT environment, what’s top of mind? The answer is usually preventing data breaches and protecting critical data—intellectual property, information on people and so on.

When we look at the systems that need to be secured in order to protect those data sets, many often overlook Microsoft Active Directory.

Used by more than 90 percent of organizations, when Active Directory is compromised, attackers can gain access to the entire IT infrastructure. You may not realize it, but this application is currently under heavy attack because our adversaries know its value.

Let’s take a closer look at the five critical questions to ask about your IT security that you may not have thought of.

(For a deeper dive into this topic, check out a recent webinar on critical security questions CIOs are asking.)

Continue Reading →

Private Cloud, Take 2: Predictions for 2017

Clouds

While an industry-wide love affair with public cloud continues to rage, the goal of providing a parallel experience for on-premise IT remains unsatisfied.

What we have seen so far is a thin veneer on top of existing aging vendor offerings (VMware), and with OpenStack, a passionate community has been iterating an open source solution of self-service for developers. In both cases, the operations characteristics do not resemble public cloud at all, limiting the adoption.

Next year, a new definition of private cloud will evolve to create an operations-focused take on private cloud with three key characteristics.

Continue Reading →

Top 5 Predictions in IT Infrastructure and Security for 2017

Hands Holding Crystal Ball

As we head into the new year, there is a lot of reflection on what we have accomplished and where we tried but didn’t succeed. Looking forward, I am most excited about the massive architectural changes going on in infrastructure as it adapts to business requirements.

Cloud computing has had a tremendous impact on what organizations expect from their environments. Those expectations will have a remarkable impact on what emerges and defines 2017.

Here are my Top 5 predictions as to what to expect in 2017 in IT infrastructure and security.

Continue Reading →

How IT Security Executives Are Taking on Social Media

Twitter on Mobile Device

If you’re an IT security pro, you’re probably aware that social media can be leveraged in security attacks … but did you also know it can help build your personal brand and connect you with others in your space, including top talent?

In this industry report by Leadtail, Inc., research revealed how the most influential IT security executives in North America (more than 600) use Twitter to connect, learn and share. Let’s look closer at those findings now.

Continue Reading →