With average total cost of a data breach continuing its way up year over year, the Big Tech companies are focusing on privacy, data protection and information security policies implemented by default. While businesses are looking to add new security layers and protect against all risks associated with a breach.In a joint effort to make[…] Read
Ever since cybersecurity began in the 70s, the focus was always building a good defense as part of the main strategy. The problem with conventional security has traditionally been its reactive nature to security, such as patching software, finding and fixing system vulnerabilities and other type of responsive actions to protect the infrastructure. As years[…] Read
Microsoft has recently published details of a massive phishing attack that targeted more than 10,000 organizations. The worrying details about this particular attack is how it manages to bypass 2-factor authentication by using adversary-in-the-middle (AiTM) phishing sites to steal passwords and session data. The malicious actors used adversary-in-the-middle (AiTM) phishing sites to steal passwords and[…] Read
For as many years as the public cloud has been around, so has been the debate over whether or not it’s secure. When AWS launched in 2006 and Azure shortly thereafter in 2008, the public cloud was considered uncharted territory. IT professionals didn’t know whether to trust it or be weary. This was much like[…] Read
Managed IT Services: Is It Time For A More Automated, Secure Alternative? Technology has made businesses more competitive than before. This is because businesses have moved to a digital realm where they can connect to customers, place and respond to orders, and even communicate with stakeholders from one place. While the benefits of technology are[…] Read
Published by Carla Kaine, Kaine Mathrick Tech (KMT)
Predicting the future is tricky. You only need to look at Covid, who saw that coming, right? So, in this article instead of guessing the future, we decided to go the easy way and look back into what has happened in 2021 so far. By digging some solid data that can help understand which of[…] Read
We are yet to see the paint dry from the last product renaming round, yet here comes Microsoft’s threat protection suite with a new batch of names for us to digest. Old Azure Sentinel is now called Microsoft Sentinel, following the same trend seen with Office 365 and a bunch of other products. If you[…] Read
Digital transformation is necessary for businesses, but it comes with security challenges. Read this blog to find out how managed security services enable it. Enabling The Digital Transformation With Managed Security Services Business owners across all industries are rushing to breathe new life into their companies through digital transformation initiatives. For many, this used to be only[…] Read
Published by Carla Kaine, Kaine Mathrick Tech (KMT)
Many events and conferences were cancelled and moved online since Covid came about. However, as me move toward 2022, most cybersecurity conferences are making an in-person comeback. It’s still early, and some dates may be rescheduled but I wanted to go ahead and pick what I believe will be the top ones nevertheless. So below,[…] Read