by Ken Presti | Dec 14, 2020 | Security
For most technologies, Trusted Advisors can recommend, set-up, integrate and optimize. Then they can test solution to make sure that it works. If everything works, the job is done. If not, then there’s more that needs to be done. In any case, barring any additional...
by Ken Presti | Jun 30, 2020 | Security
A new report by Trustwave’s Threat Fusion Team has uncovered a previously unknown malware targeting companies doing business in China. The malware was uncovered through a recent proactive threat hunt commissioned by an undisclosed client. Named “GoldenSpy” by...
by Ken Presti | Mar 17, 2020 | Security
As covered in this blog space last week, AVANT has launched its latest 6-12 Report. This one is on IT Security. The mission of the 6-12 Report is to provide the enterprise decision maker with a detailed assessment of the featured technology so that they can make an...
by Ken Presti | Feb 18, 2020 | Security
Adding new IT solutions within your technology infrastructure can sometimes be a tricky proposition, even in circumstances where the upgrade provides a solid business benefit to your company. Aside from the potential budgetary impacts and the inevitable hoops to jump...
by Ken Presti | Jan 28, 2020 | Security
Unless your company is truly starting from scratch with a greenfield installation, which is truly rare in the enterprise computing space, the first step in approaching your security posture will be a true and honest assessment of what is already in place. The...
by Ken Presti | Dec 3, 2019 | Security
No matter how much money your company spends on security solutions, your most important defense is almost always the vigilance of your own team. The errant click on the malicious link, and the thumb drive found in the parking lot carrying malware have become almost...