X

The Next Next Big Thing

Ajmal Kohgadai

Product Marketing Manager

New eBook – Definitive Guide to Cloud Threat Protection

Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a...

By Ajmal Kohgadai | December 5, 2016

225 Information Technology (IT) Interview Questions

Whether you’re interviewing a candidate for an IT position or a position in charge of...

By Ajmal Kohgadai | November 28, 2016

What’s Adaptive Authentication? How Does It Work?

While backdoor hacks and zero-day exploits remain a concern for enterprises who want to protect...

By Ajmal Kohgadai | October 31, 2016

Top 10 Cloud Collaboration Tools

Long before computers became ubiquitous, collaboration tools were an essential part of working in teams...

By Ajmal Kohgadai | October 19, 2016

Top Phishing Test Tools and Simulators

No matter how secure your network, applications, and endpoints, or whether you use security technologies...

By Ajmal Kohgadai | September 30, 2016

Download New Cyber Security Report – TAG Cyber Security Annual Volume 1

Dr. Edward G. Amoroso, CEO of the Amoroso Group (TAG Cyber), recently published the 2017...

By Ajmal Kohgadai | September 30, 2016

Top Cyber Security Companies and Vendors

As more business-critical functions rely on information systems and the internet, enterprises are increasingly exposed...

By Ajmal Kohgadai | September 30, 2016

What Is HIPAA Security Rule and Privacy Rule?

The U.S. Congress enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 with...

By Ajmal Kohgadai | September 22, 2016

Cyber Security Training – Top 12 Resources

As more organizations hire information security professionals to help protect their data from breaches, demand...

By Ajmal Kohgadai | September 21, 2016

HIPAA Violations Examples and Cases – 8 Cautionary Tales

The Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare...

By Ajmal Kohgadai | September 21, 2016

What is Salesforce Security Token and How Do I Find It?

Your Salesforce security token is a case-sensitive alphanumeric key that is used in combination with...

By Ajmal Kohgadai | September 21, 2016

CISM vs CISSP Certification — What Are the Differences and Which One Is Best For Me?

While IT security products, like CASBs, is one way to deal with cybersecurity risks, the...

By Ajmal Kohgadai | September 12, 2016

Top 5 HIPAA-Compliant Cloud Storage Services

Healthcare organizations are embracing the many advantages of cloud computing, including its scalability, cost-efficiency, and...

By Ajmal Kohgadai | September 2, 2016

Can Bug Bounty Programs Halt the Rise of APTs?

Security researchers recently discovered a new, advanced form of malware that is so sophisticated, it...

By Ajmal Kohgadai | August 18, 2016

13 Box Security Best Practices

As one of the most widely used file sharing SaaS platforms, Box was built from...

By Ajmal Kohgadai | August 10, 2016

Migrating to Exchange Online? Don’t Overlook These Encryption Settings

Microsoft Office 365 is now the most used enterprise cloud service by user count. However,...

By Ajmal Kohgadai | July 28, 2016

The Top 5 IT Skills of 2016

At one time time, the IT department was perceived as a back office support function....

By Ajmal Kohgadai | July 5, 2016

Incident Response Steps – Download a Free Checklist

When you look at the worst responses to data breaches, one thing becomes clear: when...

By Ajmal Kohgadai | June 23, 2016

Office 365 Security Concerns: Free Gartner Report on Enhancing Security of Office 365

Office 365 is now the most popular enterprise cloud service by user count and Microsoft...

By Ajmal Kohgadai | June 1, 2016

17 Salesforce Security Best Practices

For years, security concerns have been the leading reason why organizations hesitated to adopt cloud...

By Ajmal Kohgadai | June 1, 2016