Product Marketing Manager
New eBook – Definitive Guide to Cloud Threat Protection
Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a...By Ajmal Kohgadai | December 5, 2016
225 Information Technology (IT) Interview Questions
Whether you’re interviewing a candidate for an IT position or a position in charge of...By Ajmal Kohgadai | November 28, 2016
What’s Adaptive Authentication? How Does It Work?
While backdoor hacks and zero-day exploits remain a concern for enterprises who want to protect...By Ajmal Kohgadai | October 31, 2016
Top 10 Cloud Collaboration Tools
Long before computers became ubiquitous, collaboration tools were an essential part of working in teams...By Ajmal Kohgadai | October 19, 2016
Top Phishing Test Tools and Simulators
No matter how secure your network, applications, and endpoints, or whether you use security technologies...By Ajmal Kohgadai | September 30, 2016
Download New Cyber Security Report – TAG Cyber Security Annual Volume 1
Dr. Edward G. Amoroso, CEO of the Amoroso Group (TAG Cyber), recently published the 2017...By Ajmal Kohgadai | September 30, 2016
Top Cyber Security Companies and Vendors
As more business-critical functions rely on information systems and the internet, enterprises are increasingly exposed...By Ajmal Kohgadai | September 30, 2016
What Is HIPAA Security Rule and Privacy Rule?
The U.S. Congress enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 with...By Ajmal Kohgadai | September 22, 2016
Cyber Security Training – Top 12 Resources
As more organizations hire information security professionals to help protect their data from breaches, demand...By Ajmal Kohgadai | September 21, 2016
HIPAA Violations Examples and Cases – 8 Cautionary Tales
The Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare...By Ajmal Kohgadai | September 21, 2016
What is Salesforce Security Token and How Do I Find It?
Your Salesforce security token is a case-sensitive alphanumeric key that is used in combination with...By Ajmal Kohgadai | September 21, 2016
CISM vs CISSP Certification — What Are the Differences and Which One Is Best For Me?
While IT security products, like CASBs, is one way to deal with cybersecurity risks, the...By Ajmal Kohgadai | September 12, 2016
Top 5 HIPAA-Compliant Cloud Storage Services
Healthcare organizations are embracing the many advantages of cloud computing, including its scalability, cost-efficiency, and...By Ajmal Kohgadai | September 2, 2016
Can Bug Bounty Programs Halt the Rise of APTs?
Security researchers recently discovered a new, advanced form of malware that is so sophisticated, it...By Ajmal Kohgadai | August 18, 2016
13 Box Security Best Practices
As one of the most widely used file sharing SaaS platforms, Box was built from...By Ajmal Kohgadai | August 10, 2016
Migrating to Exchange Online? Don’t Overlook These Encryption Settings
Microsoft Office 365 is now the most used enterprise cloud service by user count. However,...By Ajmal Kohgadai | July 28, 2016
The Top 5 IT Skills of 2016
At one time time, the IT department was perceived as a back office support function....By Ajmal Kohgadai | July 5, 2016
Incident Response Steps – Download a Free Checklist
When you look at the worst responses to data breaches, one thing becomes clear: when...By Ajmal Kohgadai | June 23, 2016
Office 365 Security Concerns: Download Definitive Guide to Office 365 eBook
Office 365 is now the most popular enterprise cloud service by user count and Microsoft...By Ajmal Kohgadai | June 1, 2016
17 Salesforce Security Best Practices
For years, security concerns have been the leading reason why organizations hesitated to adopt cloud...By Ajmal Kohgadai | June 1, 2016