Armor Blog

CYBER SECURITY & THREAT INTELLIGENCE FROM THE EXPERTS AT ARMOR.

Guest Author,

Author's Blog Posts

Jul 252019

An Actionable Road Map For Cloud Migration

By: Nitin Agarwal This blog was shared by Armor channel partner Motifworks, a cloud solutions company focused on helping clients drive value through cloud enablement. A version of this blog post was originally published on Forbes. While enough has been said about the new possibilities and efficiencies offered by the cloud, both public and private, cloud transformations […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Mar 282019

Protecting Your Virtual Assets from Physical Threats

Where there’s a will, there’s a way—and, for black hat hackers, there’s always a will and a way to get what they’re after. As a decision maker or IT professional in your organization, you’ve likely set up strong defenses against virtual threats facing your network, such as phishing, social engineering, business email compromise scams, etc. […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Mar 52019

Securing Your Company’s Communication Channels

You’re likely no stranger to the saying, “if these walls could talk,” and have been thankful a time or two that they can’t. But, what about the virtual walls, or more so, the internal communication channels your employees use daily—can they talk? Unfortunately, with the combination of a persistent threat actor and improper security for […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 152019

Cybersecurity for Accounting & Finance Leaders– Embark Partner Blog

It’s the new year, which means new budgets for enterprises! With cyberattacks being one of the top 3 financial risks facing businesses today, financial leaders can ill-afford to overlook cybersecurity as a serious component of 2019 planning. We recently teamed up with our partners at Embark to develop the following blog providing best practices for […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jan 102019

Effective Internal Audit Procedures Strengthen Your Cybersecurity – Embark Partner Blog

Are you haunted by all the need-to-be-checked boxes that come with an audit? Internal auditors know that not meeting compliance equals more than just a hefty fine, it also opens doors for hackers to infiltrate your environment. We recently teamed up with our partners at Embark to bring you a blog filled with guidelines on […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Dec 192018

Smart Life: Don’t Be Dumb with Your Smart Devices

With the holiday season approaching, it’s becoming clearer how much the Internet of Things (IoT) has expanded and how little many people (and companies) are paying attention to smart device security. Learn more.

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 302018

Retailers & PII, Oh My!

The holidays are often thought of as the season for giving. But in the retail industry, it is also a season of cyberattacks, fraud, and identity theft. In the world of cybercrime, the spirit of giving is replaced by the spirit of scheming, and threat actors are hard at work.   Retailers must be extra diligent in protecting the precious […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 172018

Security Considerations for Blockchain Technology

Talk of blockchain technology often comes with a promise of better data management and security. History has shown, however, that full-proof cybersecurity is elusive, and new technologies always bring new security needs to focus on. In this regard, blockchain technology is no different. What is blockchain? Before going any further, let’s take a moment to […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 112018

Cryptojacking & Blockchain

Exploiting the ecosystem around cryptocurrencies has become big business for cybercriminals. During the past few years, cybersecurity firms and observers have noted a spike in everything from phishing scams targeting e-wallet credentials to targeting the initial coin offerings (ICO) that serve as crowdfunding for many companies.   Cryptojacking  Adding to this list of challenges is cryptojacking. […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Oct 42018

Cybersecurity Attacks vs. Physical Disasters

Natural disasters caused by extreme weather conditions, particularly hurricanes and typhoons, are becoming more devastating than ever. But while the World Economic Forum has tagged extreme weather events and natural disasters respectively as the top two global risks most likely to occur, a purely man-made risk isn’t far behind. Number three on that list is […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.