|
Blog
|
2016 Cybersecurity Awareness Month

5 Steps to Easier, More Effective Cybersecurity Conversations

Arraya Insights| October 27, 2016

Cybersecurity is complex and it’s only getting more so each day. This is true of the methods used by cybercriminals to break in to corporate networks and of the methods used by businesses to keep them out. While there may never be such a thing as highly-simple and highly-effective cybersecurity, there is a way to […]

Read More >

Identity is the New Security Perimeter

Arraya Insights| October 26, 2016

Today we live in a post-information age. One where people and businesses are driven to a new way of communicating, working, and well… living. A large amount of the credit for this change can be attributed to the internet and apps, both web and mobile. Convenience was a big driver for the success of these […]

Read More >

Why You Can’t Do Without a Cybersecurity Partner

Arraya Insights| October 25, 2016

Confidence around a cybersecurity topic is usually a good thing – but not in this case. More than six-out-of-10 (65%) organizations are confident they will suffer a data breach of some kind in the next year, according to research by Okta. There’s no question that’s the kind of confidence businesses could do without. Staying out […]

Read More >

Don't Leave Securing Email to End Users

Arraya Insights| October 19, 2016

Regardless of who you vote for on November 8th, one occurrence in the campaign has shaken every email administrator to their core, namely the WikiLeaks dump of John Podesta’s emails. While  the details of how the hack occurred are scarce, clearly Podesta’s entire mailbox was accessed and subsequently dumped. The only detail known is that […]

Read More >

Remove the Fog of Unknown Cloud Applications

Arraya Insights| October 13, 2016

As a technology professional, security has always been at the forefront of my thought process. I’ve been interested in security since I started in the industry in 2007. Back then, security was present, but much less complex than it is today. Most companies had the majority of their IP and other resources locked in an […]

Read More >