Many Virtual Desktop Infrastructure (VDI) solutions offer both a native client and an HTML5 alternative, the latter of course having the advantage of not requiring anything installed on the user’s computer and the…

PAM Evolution and why you need to ask for more from PAM I’ve recently had several meetings with journalists and analysts to introduce Osirium and Privileged Access Management (PAM). I always enjoy these…

As digital transformation continues to advance through organizations of all sizes and across all industry verticals, how these organizations prioritize, forecast and budget IT spend shifts as a byproduct of this evolution.  The…

File transfer has been around since the beginning of time. Ok, may be that’s a bit of an exaggeration, but you get the point. The year is 1971. Abhay Bhushan, perhaps tired of…

New data protection regulations require organizations a much stricter focus on the security of data and make data inventory a critical component for ensuring compliance. The amount of digital data continues to grow…

Forced browsing, also called forceful browsing, is an attack technique against badly protected websites and web applications, which allows the attacker to access resources that they should not be able to access. Such…

Data in motion, or data in transit, is data moving from one location to another, whether it’s between computers, virtual machines, from an endpoint to cloud services or through a private network and…

Electronic file transfer, abbreviated EFT is a procedure that follows an electronic format and protocol to exchange different types of data files. In today’s world, file transfer protocol (FTP) and secure file transfer protocol (SFTP) stand out…

To harden a computer system means to make it more difficult for a malicious hacker to attack. In formal terms, system hardening means reducing the attack surface – the attack surface is the…

Cloud services have become an integral part of business operations. In an increasingly interconnected world, they support real-time collaboration, access to files, and the use of applications from anywhere, as long as a…