Tackling the BYOD and Rogue Application Challenge

9/18

Tackling the BYOD and Rogue Application Challenge

In today’s world, smart devices and great new applications are everywhere.  Along with making our lives easier, they make the lives of security admins and chief information security officers (CISOs) a nightmare.  To state the issue in laymen’s terms: BYOD policy and rogue applications are akin to the Trojan horse inside the sophisticated network perimeter defenses. 

Relief for the Overworked Cyber Warriors

8/7

Relief for the Overworked Cyber Warriors

The cyber warrior community is filled with lots of innovative tools to take on the bad guys. I’m sure they would admit that they have some problems. What’s your problem? I hear a lot from customers that the biggest concern is the cross-comparing threats across different tools.

Truly Enhance Your Cyber Security Infrastructure

6/27

Truly Enhance Your Cyber Security Infrastructure

Infomercials are infamous for claiming that their product will replace all other prior products you have, and that it will be the last ones you’ll ever need.

New Study: 97 Percent of All Networks Have Been Breached

6/6

New Study: 97 Percent of All Networks Have Been Breached

In the world of cybersecurity, we all live under the auspices that network breaches are very common.  However, in the past, we have mainly had professional surveys and educated estimates of how many organizations have been impacted by cyber threats.

Mind the Gap!

5/30

Mind the Gap!

Anyone who has been on London’s mass transit has heard that the expression “Mind the Gap,” which refers to the gap between the platform and the passenger cars in the “the tube.”  But to me it has another meaning, which is finding the gap between customers’ needs and what is offered in the marketplace. SwishData established its formal Cyber Security Practice based on this simple, yet effective, premise.

Newer Articles