Arraya Insights Podcast: Liquidware's Digital Workspace Management Solutions

In this episode of the Arraya Insights Podcast, Arraya’s Kyle Jones and Halim Chtourou, welcome Liquidware’s Chris Walker, Jason Smith, and Ethan Brown to discuss Liquidware’s workspace management suite, including: Stratusphere UX Profile Unity Flex App Liquidware provides environment management, application layering, and monitoring and diagnostics through these solutions. Listen in to learn more about […]
Offer Secure Flexibility: Device Management with Microsoft Intune

Maintaining the flexible work arrangements that employees have come to know has become necessary to both retain existing talent and broaden the search for new talent. While the added benefits of remote collaboration provide many perks for employees and their productivity, it also increases attack surface and risk. As there are no signs of cyber […]
How to Build a Proactive Security Practice in 5 Steps

We’re wrapping up 2022’s Cyber Security Awareness Month and after all this talk of awareness, it’s time to focus on action. Even if you’ve been intentionally avoiding the bad news, it’s no secret that the cyber risks we face today are a problem for everyone. So now it’s time to break through the bad news […]
Microsoft Ignite 2022 Round-Up: Here’s What You Missed

Microsoft’s annual conference, Microsoft Ignite, took place in mid-October. This event gathered industry experts, tech professionals, and enthusiasts for technical training, breakout sessions, keynotes, and more. The event was held both in person in Seattle, Washington, and virtually with more than 200,000 people tuning in. Microsoft has compiled all the Microsoft Ignite 2022 news into […]
Maintaining Your Cloud Infrastructure with the Microsoft Azure Well-Architected Framework

The Microsoft Azure Well-Architected Framework is Microsoft’s set of guiding principles in maintaining and improving a customer’s workload quality in the Azure Cloud. To ensure easy adoption of the framework, there exists what are called the “five pillars of architectural excellence.” These pillars consist of Reliability, Security, Cost Optimization, Operational Excellence, and Performance Efficiency. If an […]
Proactive Security Through Application Modernization

The approach to security has changed over the years. Our relationship with technology has grown closer and cyber threats have evolved, becoming more frequent and severe. While we previously focused on a preventative approach to security, we’re now forced to take a more pragmatic, proactive approach. Today, as businesses continue their digital transformation, security should […]
Arraya Insights Podcast: Cyber Security Awareness Month - Top Tactics for a Proactive Approach

In this episode of the Arraya Insights Podcast, our panel kicks off Cyber Security Awareness Month with a roundtable on all things security. They touch on CISA’s theme for 2022: See Yourself in Cyber, and the guidance the organization is focusing on this year. The discussion covers the current threat landscape, data loss prevention, the […]
Key Insights from the 2022 Verizon Data Breach Investigations Report

Released earlier this year, the 2022 Verizon Data Breach Investigations Report (DBIR) collected and analyzed 914,547 incidents, 234,638 breaches, and 8.9 TBs of cybersecurity data. This is the 15th annual report, which was first published in 2008 (the same year the first iPhone was released, for context). As technology has changed drastically since that first […]
How the Changing Eras of Cyber Security Have Led Us to Zero Trust

The world of technology revolves around change. As technology reaches new heights, our reliance on all things digital grows. Simultaneously, malicious actors are developing new ways to take advantage of the growing digital landscape and the damage surrounding cyber-attacks has hit record numbers. The industry’s cyber security approach has grown from preventative to reactive, all […]
Your Guide to Black Hat & BSides 2022

InfoSec conventions are a great way to learn about the latest in the cyber industry through workshops, presentations, and competitions, in addition to meeting and networking with like-minded people. However, summer is a busy time, and we know not everyone was able to make it to this year’s Black Hat and BSides conventions, which were […]