For years, security practitioners have had the unenvious responsibility of architecting creative solutions to protect our end users. While there is nothing new to this, the issue is – and always will be – the moving...
In the last six months alone, more than 715 vulnerabilities were discovered within remote access systems, VPN connections and online RDP services, often lacking network layer authentication (NLA). The increased use of Web applications to connect to certain critical...
Guardium Insights 2.5 was released at the end of last year. It is a great new version of an exciting product from the Guardium team at IBM. We got it up and running over the holidays and started playing around with it. This article is a result of one of those...
You’re collecting activity monitoring data. Are you making the most of it? As security systems in general, and database monitoring tools specifically, mature and become more sophisticated,...
Interoperability (noun): the ability of computer systems or software to exchange and make use of information. It has long been said that people must work together – as a team – in order to be successful. That involves collaboration and, more importantly,...
Things looked a little different for this year’s annual Microsoft Inspire event, a conference where partners around the world gather to discuss all things related to the well-known company. Although the event was held virtually this year, the experience remained the...
Hybrid IT adoption continues to gain momentum, with 81 percent of organizations in a recent ScienceLogic study reporting they are mixing on-premises infrastructure with resources from multiple public and private cloud providers. On average, organizations are using...
In the days of the traditional “network perimeter,” security resources such as firewalls and intrusion prevention systems were dedicated to defending that perimeter. If you could keep outside threats from somehow penetrating or circumventing the exterior wall, the...
Converge brings cybersecurity and identity management experts together to discuss digital vulnerabilities in the public and private sectors. FOR IMMEDIATE RELEASE MAY 1, 2019 – OTTAWA, CANADA – Converge Technology Solutions Corp. (“Converge” or “the Company”)...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Cookie
Duration
Description
bcookie
2 years
This cookie is set by linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the page.
lang
session
This cookie is used to store the language preferences of a user to serve up content in that stored language the next time user visit the website.
language
1 month
This cookie is used to store the language preference of the user.
lidc
1 day
This cookie is set by LinkedIn and used for routing.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie
Duration
Description
_ga
2 years
This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
_gat_gtag_UA_127734268_1
1 minute
This cookie is set by Google and is used to distinguish users.
_gid
1 day
This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Cookie
Duration
Description
bscookie
2 years
This cookie is a browser ID cookie set by Linked share Buttons and ad tags.