February 2017

February 2017

Feb 222017

WHY ORGANIZATIONS SHOULD STOP SAYING “NO” AND START SAYING “YES” TO SHADOW IT

One of the larger unintended consequences of the rapid growth of cloud computing is the resurgence of shadow IT. As a term, shadow IT refers to the use of IT solutions and resources that have not been approved by the IT department. On one hand, such processes have proven to be a source of innovation […]

Feb 212017

RSA Conference 2017 Recap

Read our recap of the insights and highlights of RSA Conference 2017.

Feb 162017

RANSOMWARE: AN UNWELCOME EVOLUTION

Jeff Schilling, Chief Security Officer, Armor, explores the evolution of ransomware from a small -time threat actor tactic to a significant cyber threat.

Feb 102017

DON’T LOSE SLEEP WHEN SHOPPING FOR A CLOUD PROVIDER

Cloud oversubscription: a cloud provider metric that simplifies your purchasing decision Last weekend I was faced with the painful prospect of shopping for a mattress. It should be easy, right? I need a firm king mattress. That’s it; no other requirements. So, with a latte in my hand, I opened my laptop. Two hours later, […]

Feb 32017

TO PAY OR NOT TO PAY: OVERCOMING RANSOMWARE

At its core, ransomware is simple: threat actors break into a system, encrypts data and then sends an e-mail offering the decryption key for money. The universal counsel from security professionals and the FBI is that you don’t pay the ransom. While this firm stance against copping to their demands is inspiring, the nuances of […]