Armor Blog

CYBER SECURITY & THREAT INTELLIGENCE FROM THE EXPERTS AT ARMOR.

Guest Author,

Author's Blog Posts

Nov 212019

Know your KPIs: Are Containers the Right Approach? – Technologent Partner Blog

Justin Zimmer | Solutions Architect, Technologent  In a recent blog written and shared by Armor’s partner, Technologent, customers learned how containers—a packaged unit of application code and its dependencies enabling applications to run quickly and reliably from one computing environment to another—and Containers-as-a-Service fit into the cloud computing stack. “CaaS solutions simplify the process of […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Nov 192019

A CTO’s View: Building a Secure Cloud Migration Framework – Cloudnexa Partner Blog

MJ Diberardino | CEO, Cloudnexa & Josh Bosquez | CTO, Armor Throughout the past decade, cloud computing has completely revolutionized the way companies conduct business. No longer does the cloud only benefit IT teams. Today, it enables business processes throughout entire organizations, offering teams and companies speed, agility, scalability, cost savings, and much more. Despite […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jul 252019

An Actionable Road Map For Cloud Migration

By: Nitin Agarwal This blog was shared by Armor channel partner Motifworks, a cloud solutions company focused on helping clients drive value through cloud enablement. A version of this blog post was originally published on Forbes. While enough has been said about the new possibilities and efficiencies offered by the cloud, both public and private, cloud transformations […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Mar 282019

Protecting Your Virtual Assets from Physical Threats

Where there’s a will, there’s a way—and, for black hat hackers, there’s always a will and a way to get what they’re after. As a decision maker or IT professional in your organization, you’ve likely set up strong defenses against virtual threats facing your network, such as phishing, social engineering, business email compromise scams, etc. […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Mar 52019

Securing Your Company’s Communication Channels

You’re likely no stranger to the saying, “if these walls could talk,” and have been thankful a time or two that they can’t. But, what about the virtual walls, or more so, the internal communication channels your employees use daily—can they talk? Unfortunately, with the combination of a persistent threat actor and improper security for […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 152019

Cybersecurity for Accounting & Finance Leaders– Embark Partner Blog

It’s the new year, which means new budgets for enterprises! With cyberattacks being one of the top 3 financial risks facing businesses today, financial leaders can ill-afford to overlook cybersecurity as a serious component of 2019 planning. We recently teamed up with our partners at Embark to develop the following blog providing best practices for […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 102019

Effective Internal Audit Procedures Strengthen Your Cybersecurity – Embark Partner Blog

Are you haunted by all the need-to-be-checked boxes that come with an audit? Internal auditors know that not meeting compliance equals more than just a hefty fine, it also opens doors for hackers to infiltrate your environment. We recently teamed up with our partners at Embark to bring you a blog filled with guidelines on […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Dec 192018

Smart Life: Don’t Be Dumb with Your Smart Devices

With the holiday season approaching, it’s becoming clearer how much the Internet of Things (IoT) has expanded and how little many people (and companies) are paying attention to smart device security. Learn more.

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 302018

Retailers & PII, Oh My!

The holidays are often thought of as the season for giving. But in the retail industry, it is also a season of cyberattacks, fraud, and identity theft. In the world of cybercrime, the spirit of giving is replaced by the spirit of scheming, and threat actors are hard at work.   Retailers must be extra diligent in protecting the precious […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 172018

Security Considerations for Blockchain Technology

Talk of blockchain technology often comes with a promise of better data management and security. History has shown, however, that full-proof cybersecurity is elusive, and new technologies always bring new security needs to focus on. In this regard, blockchain technology is no different. What is blockchain? Before going any further, let’s take a moment to […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.