Ajmal Kohgadai

Product Marketing Manager

IT Security Certifications Salary Guide: CISM, CISSP, CISA, CompTIA, GSEC

For the second year in a row, there will be one million IT security job...

By Ajmal Kohgadai | February 22, 2017

IT Security Job Openings Hit One Million in 2017

At the beginning of 2016, the Cloud Security Alliance conducted a survey of IT security...

By Ajmal Kohgadai | January 26, 2017

Alert Fatigue: 31.9% of IT Security Professionals Ignore Alerts

One of the challenges of modern threat protection solutions is the sheer number of alerts...

By Ajmal Kohgadai | January 19, 2017

5 Attributes of an Effective Cloud Threat Protection Solution

Cloud security has come a long way over the last few years. Today, most enterprise...

By Ajmal Kohgadai | January 12, 2017

6 Cloud Threat Protection Best Practices from the Trenches

As enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find...

By Ajmal Kohgadai | January 5, 2017

Making a Case for a CASB – By the Numbers

The cloud access security broker (CASB) market is about to embark on its fifth year....

By Ajmal Kohgadai | December 12, 2016

New eBook – Definitive Guide to Cloud Threat Protection

Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a...

By Ajmal Kohgadai | December 5, 2016

225 Information Technology (IT) Interview Questions

Whether you’re interviewing a candidate for an IT position or a position in charge of...

By Ajmal Kohgadai | November 28, 2016

What’s Adaptive Authentication? How Does It Work?

While backdoor hacks and zero-day exploits remain a concern for enterprises who want to protect...

By Ajmal Kohgadai | October 31, 2016

Top 10 Cloud Collaboration Tools

Long before computers became ubiquitous, collaboration tools were an essential part of working in teams...

By Ajmal Kohgadai | October 19, 2016

Top Phishing Test Tools and Simulators

No matter how secure your network, applications, and endpoints, or whether you use security technologies...

By Ajmal Kohgadai | September 30, 2016

Download New Cyber Security Report – TAG Cyber Security Annual Volume 1

Dr. Edward G. Amoroso, CEO of the Amoroso Group (TAG Cyber), recently published the 2017...

By Ajmal Kohgadai | September 30, 2016

Top Cyber Security Companies and Vendors

As more business-critical functions rely on information systems and the internet, enterprises are increasingly exposed...

By Ajmal Kohgadai | September 30, 2016

What Is HIPAA Security Rule and Privacy Rule?

The U.S. Congress enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 with...

By Ajmal Kohgadai | September 22, 2016

Cyber Security Training – Top 12 Resources

As more organizations hire information security professionals to help protect their data from breaches, demand...

By Ajmal Kohgadai | September 21, 2016

HIPAA Violations Examples and Cases – 8 Cautionary Tales

The Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare...

By Ajmal Kohgadai | September 21, 2016

What is Salesforce Security Token and How Do I Find It?

Your Salesforce security token is a case-sensitive alphanumeric key that is used in combination with...

By Ajmal Kohgadai | September 21, 2016

CISM vs CISSP Certification — What Are the Differences and Which One Is Best For Me?

While IT security products, like CASBs, is one way to deal with cybersecurity risks, the...

By Ajmal Kohgadai | September 12, 2016

Top 5 HIPAA-Compliant Cloud Storage Services

Healthcare organizations are embracing the many advantages of cloud computing, including its scalability, cost-efficiency, and...

By Ajmal Kohgadai | September 2, 2016

Can Bug Bounty Programs Halt the Rise of APTs?

Security researchers recently discovered a new, advanced form of malware that is so sophisticated, it...

By Ajmal Kohgadai | August 18, 2016