Technology

Technology

White Papers

Creating a Security-First Organization Checklist

Use Armor’s workable document as your first step to becoming a “security-first” organization by defining your role in security, gauging how you can achieve compliance, and selecting the right security-service provider for your organization.

Rachel Chism Image

Rachel Chism

White Papers

Simplifying Security for Software-as-a-Service

The “Simplifying Security for Software-as-a-Service” white paper explores the threat landscape for SaaS companies, the inherent risks in the cloud, and how to achieve compliance and define your role in cloud security without adding unnecessary technical debt.

Rachel Chism Image

Rachel Chism

Reports

6 New MSPs and/or Cloud-Based Service Providers Compromised by Ransomware, A Total of 13 for 2019, Reports Armor

Armor, a global cloud security solutions provider, has identified 6 new Managed Service Providers (MSPs) and/or Cloud-Based Service Providers that have been compromised by ransomware, bringing the total number of publicly identified MSPs / Cloud-Based Service Provider victims in 2019 to 13. 6 New Ransomware Victim MSPs and/or Cloud-Based Service Providers Identified. They include: SchoolinSites—Saraland, […]

Michael Mayes Image

Michael Mayes

Content Writer

Webinars

Cybercrime, Inc: Exposing the Business of the Dark Web

The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is. The webinar aims to expose the inner workings and […]

Rachel Chism Image

Rachel Chism

Reports

The Black Market Report

For a second year in a row, Armor’s Threat Resistance Unit (TRU) research team has gone exploring. No, they haven’t been studying one of the seven wonders of the world, rather they have spent five months (from February 2019 to June of 2019) combing through twelve different underground hacker markets and forums (both English and […]

admin Image

admin

Webinars

Women in Cybersecurity: Building Careers & Community

The cybersecurity industry is projecting a staffing shortage of 1.8 million unfilled jobs globally by 2022, and 53% of organizations report a problematic shortage of cybersecurity skills. Meanwhile, women represent less than 25% of cybersecurity professionals worldwide. It’s time to narrow the gap. This webinar is for any woman hoping to the enter the fast-paced world of cybersecurity, or any […]

Rachel Chism Image

Rachel Chism

Webinars

At the Gates of the Cloud: The Mindset of Small & Medium-Sized Enterprises

What are real practitioners at small and medium-sized enterprises (SMEs) doing with their cloud infrastructures and cybersecurity programs, and why are they doing it? Our newest report commissioned in partnership with the 451 Research group dives into these questions – providing a unique lens of “on the ground” experiences and opinions. From our findings, it’s […]

Amy Bakameyer Image

Amy Bakameyer

Registration Pages

Game of Code

When you play the Game of Code, you win or you lose — maybe not your head, but money, clients, and, potentially, your business. Never fear! Armor is full of knights, sworn to protect client data, working hand-in-hand with the Kings of the Realm, like AWS, to ensure your infrastructure is secure from start to finish. We add human wisdom and […]

Rachel Chism Image

Rachel Chism

Case Studies

Quint: Leading International Online Fintech Businesses in the Consumer Credit Sector, with Uncompromised Security

An Armor client since June 2017, Quint Group is a global multi award-winning operator of financial technology (fintech) businesses that uses proprietary technologies to power a portfolio of leading online fintech businesses in the consumer credit sector. Quint is based in the UK and with presence in the USA, Poland, China, South Africa and Australia. Learn more about how Armor helps Quint ensure the highest confidence to both their clients, and their five subsidiaries that their valuable data is both secure and compliant by downloading the case study.

Amy Bakameyer Image

Amy Bakameyer

Reports

Blockchain (R)evolution: Exploring the Past, Present and Future of Blockchain Technology, from the Corporate World to the Underworld

This report offers an overview of its admittedly fuzzy origins, its evolution to Blockchain 2.0, attraction for crypto pirates, and potential to expand into more legitimate industries.

Amy Bakameyer Image

Amy Bakameyer