Armor Blog

CYBER SECURITY & THREAT INTELLIGENCE FROM THE EXPERTS AT ARMOR.

Guest Author,

Author's Blog Posts

Jan 152019

Cybersecurity for Accounting & Finance Leaders– Embark Partner Blog

It’s the new year, which means new budgets for enterprises! With cyberattacks being one of the top 3 financial risks facing businesses today, financial leaders can ill-afford to overlook cybersecurity as a serious component of 2019 planning. We recently teamed up with our partners at Embark to develop the following blog providing best practices for […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 102019

Effective Internal Audit Procedures Strengthen Your Cybersecurity – Embark Partner Blog

Are you haunted by all the need-to-be-checked boxes that come with an audit? Internal auditors know that not meeting compliance equals more than just a hefty fine, it also opens doors for hackers to infiltrate your environment. We recently teamed up with our partners at Embark to bring you a blog filled with guidelines on […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Aug 12018

Pulsant Strengthens Security Capabilities with Armor Partnership

Security capabilities are a hugely important aspect of any business IT infrastructure – perhaps the most important of them all considering today’s threat landscape. Consider this: seven out of ten organisations said their security risk increased significantly across 2017, yet only one-third believe they have the adequate resources to manage security effectively. You only need to read the newspaper […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 182018

Eliminating the Noise: A New Approach to Cybersecurity Metrics

Simply put – cybersecurity has a metrics problem. Why is it so difficult to answer, “How secure are we?” All too often security teams are left looking like a deer in the headlights when asked the question, “How secure are we?” The truth, however, is that it doesn’t have to be that way. To be […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Sep 272017

Onboarding and Enablement: Better Together

There’s a saying, “You will never get a second chance to make a first impression.” With anything new comes excitement around possibilities and eagerness to get started. However, making sure that a supplier relationship gets off on the right foot means starting strong with onboarding and enablement. These are often lumped together as one process, […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jul 192017

Microsoft Inspire – Putting Cyber Security at the Forefront

I associate July with several things, the beginning of the Microsoft Fiscal year, summer heat in Texas and the annual Microsoft’s Partner Conference, now known as “Microsoft Inspire.” At the close of last week’s Washington, D.C. conference, I realized it marked for me the fifth rendition of the event as both a full-time employee and […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jul 62017

Navigating Microsoft – Preparation Leads to Opportunity

Microsoft is a very large and complex organization that can prove difficult to navigate from a partner perspective.  While aligning a go-to-market plan with this behemoth organization can often seem daunting, it can also be very fruitful for the bottom line.  Fortunately, once a firm grasp of how to best work with the company exists, […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jun 222017

Cloud Security 101: A Partner’s Perspective

When I went to work for IBM in the early 2000’s, one of the first things I learned was how to work with business partners to create hardware and software solutions in the SMB space. At that time, the business model for partners was far less ambiguous. Hardware in all of its forms, and the […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Apr 252017

Facing The Shadow Brokers (TSB) Exploit Dump – Best practices to help protect IT infrastructure

Christmas has come early for hackers around the world as they pour through the treasure trove of previously unseen exploits released by The Shadow Brokers (TSB). The tools were reportedly developed and utilized by the National Security Agency and are currently permeating underground criminal online forums. While the hackers are working to reverse engineer and […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.