The Importance of Cloud Computing in Education

Over the last ten years, technology and the importance of cloud computing have caused significant shifts in education and how students learn. One way to foster an environment of innovation in schools is through cloud computing. Cloud computing offers opportunities for innovation and benefits in the classroom that are both safe and cost-effective.

Ensuring AWS Cloud Security Compliance from Industry Experts

Are you looking for ways to ensure continuous security compliance on Amazon Web Service (AWS)? At Vandis’ latest event, the Cloud Conference in New York City, top industry partners shared tips and solutions for keeping attacks at bay, and maintaining the safety of your infrastructure and data; however, it’s not too late to learn a bit by downloading the event's presentations.

Taking Charge of Your Firewall with Rulesets [Webinar]

Networks used to be much more straightforward, consisting of a few devices with rules manually written by a few individuals. As such, systems were relatively stable. Technologies such as Cloud Computing, Virtualization, and the Internet of Things created complex and dynamic networks comprised of countless devices. Now, our partner, Firemon, shows us how to better manage firewall rulesets in the latest Vandis Insight's Blog webinar recap.

Gambling with Network Security in Las Vegas

Nathan J. Lichtenstein is a Senior Network Engineer at Vandis; he is a critical player in ensuring that our clients' network infrastructure needs are met, whether on-premise or in the cloud. Recently, Nathan headed out on vacation to Las Vegas, but taking an engineer out of the office doesn't quell curiosity; he quickly discovered that the Casino's network security was less than ideal.

Where Cloud Computing, and Customers, are Going in 2019

Thanks to the folks at Intricately, a company that collects data to understand the market, we now have a better understanding of what companies are doing now to fight for our attention, how customers are making decisions, and what the future might hold.

Manage and Deploy Workloads Across Clouds without Worry

Has your enterprise or organization been dealing with the troublesome tasks of managing and deploying workloads across different cloud environments? Working with multiple clouds can create trouble for your team, and force developers to juggle various APIs in their workflow. A new solution from Google, known as Anthos, is hitting the market and might solve your problems.

Don't Take the Bait: Avoiding Phishing Attacks at Work

Phishing schemes have been top attack vectors for the past several years; they are 'tried and true' methods that generally result in a high level of success for attackers, granting them access username and password details, bank accounts, social security numbers, email addresses, other sensitive information. As such, it is expected that the number of phishing attacks will soon surpass that of web-based application attacks.

Bridging the Gaps of Risk Management From Theory to Practice

While the definition and scope of risk management are wide-ranging, effective risk management is a product of taking a very specific set of measures. Without tailoring risk management efforts to meet our precise needs, we are left with generic “best practices” that may or may not be effective in a given scenario. These nonspecific practices are what lead to the gaps between risk management theory and risk management practice.

Setting Traps for Security Hackers with Deception Technology [Webinar]

Deception Technology lures attackers to strategically placed, heavily-instrumented decoys throughout the network. When an attacker trips over one of these decoys, the solution is triggered to begin generating reports and recording the attacker's actions, providing reliable forensics to see what attackers are doing and where they are going in the network.

The Need for Artificial Intelligence in Today’s Security Landscape [Webinar]

The DarkTrace Enterprise Immune System solution uses Artificial Intelligence (AI systems) and unsupervised machine learning to understand what is normal in your network, and subsequently detect and respond to anything abnormal; this is not end-point security or perimeter-based security - it is situated at the core of the network, providing raw data and protecting against attacks coming in through any kind of computing devices.