Proactive Security Through Application Modernization

The approach to security has changed over the years. Our relationship with technology has grown closer and cyber threats have evolved, becoming more frequent and severe. While we previously focused on a preventative approach to security, we’re now forced to take a more pragmatic, proactive approach. Today, as businesses continue their digital transformation, security should […]
Arraya Insights Podcast: Cyber Security Awareness Month - Top Tactics for a Proactive Approach

In this episode of the Arraya Insights Podcast, our panel kicks off Cyber Security Awareness Month with a roundtable on all things security. They touch on CISA’s theme for 2022: See Yourself in Cyber, and the guidance the organization is focusing on this year. The discussion covers the current threat landscape, data loss prevention, the […]
Key Insights from the 2022 Verizon Data Breach Investigations Report

Released earlier this year, the 2022 Verizon Data Breach Investigations Report (DBIR) collected and analyzed 914,547 incidents, 234,638 breaches, and 8.9 TBs of cybersecurity data. This is the 15th annual report, which was first published in 2008 (the same year the first iPhone was released, for context). As technology has changed drastically since that first […]
How the Changing Eras of Cyber Security Have Led Us to Zero Trust

The world of technology revolves around change. As technology reaches new heights, our reliance on all things digital grows. Simultaneously, malicious actors are developing new ways to take advantage of the growing digital landscape and the damage surrounding cyber-attacks has hit record numbers. The industry’s cyber security approach has grown from preventative to reactive, all […]
Demystifying Microsoft CSP Licensing: Our Most Frequently Asked Questions

Microsoft solutions and services are a staple of productivity for businesses of all sizes and industries. However, due to the broad scope of options available, Microsoft licensing has long been a complicated and convoluted affair. As a result, many businesses aren’t handling their licensing as efficiently as they could be and find themselves with a […]
Your Guide to Black Hat & BSides 2022

InfoSec conventions are a great way to learn about the latest in the cyber industry through workshops, presentations, and competitions, in addition to meeting and networking with like-minded people. However, summer is a busy time, and we know not everyone was able to make it to this year’s Black Hat and BSides conventions, which were […]
VMware Explore 2022 Announces the Latest Innovations for Workloads, Wherever They’re Running

VMware Explore 2022 took place during the last week of August, offering new perspectives, experiences, and communities. Throughout the four-day conference, there were a number of important and exciting announcements made that highlighted breakthrough innovations that will help organizations better manage their workloads, no matter where they are running. In case you weren’t able to […]
Arraya Insights Podcast: Application Modernization - Security Implications and Considerations

Digital transformation has become an essential step for businesses looking to advance in their industry and remain competitive. For the many businesses who are considering or have already started their migration to the cloud, the journey doesn’t stop there. The next phase, the application modernization process, is where the true benefits of digital transformation lie. […]
2022 IBM Report: Cybercrime Reaches an All-Time High

Businesses face few risks today as dangerous as cybercrime. While cybercrime is nothing new, it’s reaching unprecedented levels of damage as businesses grapple with unrelenting attacks and the rising costs associated with them. IBM Security recently released its annual Cost of a Data Breach Report, which is conducted by the Ponemon Institute. Now, the average […]
Cisco’s New Meraki & Catalyst Integration Capabilities Provide Streamlined Management

The future of modern business is in the cloud. Cloud-based applications provide increased flexibility, scalability, and cost-savings. To take advantage of these benefits, many businesses and enterprises heavily rely on two of Cisco’s most popular offerings: Meraki, Cisco’s cloud-management network offering, and Catalyst, Cisco’s brand of access switches to manage their environment These two offerings […]