|
Blog
|
Information Technology Security

9 Revealing Stats from Cisco’s 2020 CISO Benchmark Study

Arraya Insights Arraya Insights| May 11, 2020

Looking for some insight into what your peers are doing (and seeing) as they work to keep their own organizations secure? One resource worth checking out is Cisco’s 2020 CISO Benchmark Study. In compiling this incarnation of its yearly tradition, Cisco crowd-sourced the knowledge and experiences of more than 2,800 technology decision-makers from around the […]

Why You Need to Patch Your Windows 10, Server Instances ASAP

Arraya Insights Arraya Insights| January 27, 2020

Heads up: Microsoft and the National Security Agency (NSA) just sounded the alarm on a newly-discovered Windows vulnerability, one that has left potentially hundreds of millions of devices open to attack. Designated CVE-2020-0601, it affects certificate validation within devices running Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server version 1803. Essentially, attackers […]

5 App Dev Myths Part 4: Custom Development Compromises My Security

Arraya Insights Arraya Insights| January 15, 2020

There’s a great amount of interest in custom-built applications – and quite a few misconceptions about them as well. Arraya’s Application Development team has encountered many of these, including concerns about complexity, use cases, and more. During this five-part series, our team will seek to dispel some of the more common misunderstandings about custom-built applications […]

Read More >

Cyber Insurance Gap May Leave Merck Hanging After NotPetya

Arraya Insights Arraya Insights| December 10, 2019

During the summer of 2017, pharmaceutical giant Merck was one of countless companies, around the world hit by the most devastating cyber-attack in history: NotPetya. Initially masquerading as ransomware, NotPetya turned out to be far worse: a strain of malware designed to destroy systems rather than hold them hostage. The toll NotPetya inflicted on Merck […]

3 Factors (Besides Budget) That Promote Cyber Security Success

Arraya Insights Arraya Insights| December 5, 2019

Here’s something we can all be thankful for this holiday season: Larger cyber security budgets are reportedly on their way! In a recent FireEye study, 76% of participants said they expect their security budgets to increase in 2020. That’s obviously encouraging for those fighting the good fight and bad news for those on the other […]

Read More >

Arraya Insights Radio: Cyber Security 2020: Refocusing for the New Year

Arraya Insights Arraya Insights| November 27, 2019

Arraya Insights Radio Episode 17: Cyber Security 2020: Refocusing for the New Year Cyber Security was a hot topic all year long and next year promises to be more of the same. More of the same, but also different. On this episode of Arraya Insights Radio, Thomas York, Senior Director of IT Operations, welcomes a […]

8 Cyber Security Blind Spots that Could Cost SMBs Big

Arraya Insights Arraya Insights| September 5, 2019

No entity, no matter the size, can afford cyber security blind spots. The recent string of ransomware attacks targeting local governments has underscored that point. Hackers have gone after major cities like Baltimore and they’ve hit places the average person is less familiar with, like Lake City, FL. Despite the risks, many small-to-midsized municipalities, businesses, […]

Read More >

Safety in the Cloud with Dell EMC Data Protection for VMC on AWS

Arraya Insights Arraya Insights| July 12, 2019

Back in the spring, we wrapped up a months-long deep dive into the features and benefits of VMC on AWS. Along the way, we covered NSX integration and native tools, as well as the solution’s ability to power migration simplification and disaster recovery. However, a topic came up at our recent Arraya Solutions Tech Summit […]

Read More >

When to Trust in TACACS+: 3 Use Cases

Arraya Insights Arraya Insights| July 3, 2019

These days, everybody is looking for a cyber security silver bullet. Organizations want something flashy, new, and most importantly, capable of besting any threat or malicious actor that may cross its path. TACACS+ is none of those things. In truth, that perfect cyber security cure-all may never materialize. Instead, the most successful security postures use […]

Read More >

Keeping Your Organization Safe with Password Management and DUO 2FA

Brandon Levengood Brandon Levengood| June 27, 2019

Most cybersecurity experts will advise employees to keep their personal information off their company-issued devices. In fact, most companies’ acceptable use policies require it. Yet, despite the ample warnings and policies, employees continue to use their work devices for decidedly non-work purposes. With the growing popularity of remote working, road-warriors, bring your own device (BYOD), […]

Read More >