security

Azure or hybrid infrastructure as an alternative to SQL Server, Windows Server 2008 and 2008 R2
4.5
14.10.19

In 2019, Microsoft has ended the support and monthly updates of SQL Server, Windows Server 2008, and 2008 R2. As a result, the systems are subject to the risks of security and non-compliance with the requirements of legislation and regulatory authorities. The question is, how to prevent data loss...

Three reasons why spear phishing is so effective
5.0
17.07.19

It seems you can hardly go a day without hearing about another data breach, money transfer scam, or some other crime that started out as a spear phishing attack.  Email-borne threats have always been a top priority for IT security, but spear phishing is one of the fastest growing attacks.&nb...

Are you Ready to Entrust Your Data to an Outsourcing Company?
5.0
04.07.19

Letting third parties access the infrastructure is a sensitive issue for any security service, and allowing third parties to read the internal correspondence of employees is even worse. For most companies, this sounds like a nightmare. However, Anna Popova, Head of the Data Leak Prevention System...

Disk Encryption at the Service of Confidentiality
5.0
19.06.19

Disk encryption is an information protection technology that converts disk data into a code unbreakable for an intruder. It is based on the AES-NI algorithm, and keys are managed as per the KMIP 1.1 standard. All VM disk operations are encrypted on the fly—this ensures high security and rel...

Security Operations Centers. How Do They Work?
5.0
18.06.19

How did the company’s information network security system look like some 10 years ago? “Prohibit and keep out” principle was drilled into IS specialists’ minds. As soon as Odnoklassniki, VKontakte appeared, the access should be immediately closed. Managers found a game in ...

Threat Spotlight: IoT application vulnerabilities leave IOT devices open to attack
5.0
13.06.19

IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality....

10 reasons to migrate to Microsoft SQL Server 2019
4.0
18.03.19

At the heart of the modern data platform In the last decade SQL Server has made its way from a solution for small and medium RDBMS to a powerful data platform for companies and business critical applications, highly reliable and failure-safe. Every new release of SQL Server looks more and more...

Penetration Tests: Can You Get Hacked Or Not?
4.0
04.03.19

The fact that sooner or later someone will try to hack you is a shocking piece of news for business. And the issue is not only about competitors aiming at new products, or intruders conceiving the idea of blackmail. Any company may become a target of random carpet bombing, for example fishing. Or...

Security Operations Center as a Service. How does it work?
5.0
26.02.19

In the age of digital economy, high-speed internet, and mobile devices, installing the security tools and preventing access to blacklisted websites is not enough. The cybersecurity tools should always be under control; otherwise, the measures taken will not only be ineffective but also create a d...

Information security as a part of digital transformation
5.0
14.01.19

A couple of decades ago, a computer program was used for application purposes for the first time, and that was the beginning of digitalization. We will use this word for everything associated with usage of software, binary code, IT. Initially, programs were used for calculations, but consequently...

A dozen predictions on cybersecurity trends for 2019
5.0
10.01.19

Security of critical infrastructure Of course, the hot topic of the year and even the next few years in Russia will be the security of critical infrastructures. This will be fostered primarily by compliance. Many companies will undertake categorization of their infrastructures. Those who ...

Mobile Tricks: a Few Ways to Cheat DLP Systems and to Prevent It
5.0
18.09.18

When DLP systems first appeared in Russia, they were designed only for workstation protection. However, due to the recent technological developments, adoption of the BYOD concept by businesses, wide use of smartphones and tablets, frequent business trips, and an increasing number of home-office w...

Cybersecurity in Cloud Environments. CASB and Other Technologies
5.0
07.09.18

Businesses experience a paradigm shift as they enter the age of digital transformation. Conventional models and business processes become inefficient; old communication methods no longer work. Employees get more and more personal gadgets and use them to work out of the office. To ensure productiv...

Out-of-the-Box Cloud Solutions by Softline
5.0
20.08.18

The IT processes of any company can be divided into two groups: unique processes specific for this company or the industry it operates in, and standard processes. Standard (basic) IT processes exist in one form or another in all companies. They include popular corporate services, such as antiviru...