Articles about IT Security

Maximize the Value of Your Data Assets with Storage Tiering

4 Ways to Use Analytics to Combat Surging Levels of Cybercrime

How to Implement a Security Incident Management Framework

Automation Key to Improving Data Protection Compliance

Injecting Automation into Security Policy Management

Building Secure Apps with DevSecOps

Effective Identity and Access Management Is Critical to Security

The Rising Importance of Vulnerability Management

Technologent's David Martinez Interviewed for Patient Safety & Quality Healthcare Magazine

Technologent's Jon Mendoza Interviewed for Authority Magazine

Deepfakes Mean Deep Financial Loss for Banking and Payment Industries

Insurance Under Fire: Deepfakes and Cyberattacks Run Rampant

Deepfake Phishing: Is That Actually Your Boss Calling?

Ever-Increasing Threats Make Endpoint Security a Top Priority

Technologent's Jon Mendoza featured on the Dave Nemo Show

How Data Classification and Lifecycle Management Helps You Take Control of Your Data

Deepfakes Could Mean Deep Losses for Businesses If Not Prepared (featured on Yahoo! Finance)

Why Data Loss Prevention is an Essential Tool in Your Security and Compliance Arsenal

Technologent's Jon Mendoza featured in Insurance Journal

Deep Fake: Setting the Stage for Next-Gen Social Engineering

Technologent's Jon Mendoza featured in Insurance Journal

Technologent's Jon Mendoza featured in TechRepublic

Technologent's David Martinez featured in Tech Target

Why Aren’t More Organizations Automating Security Processes?

Addressing the Challenges that Limit Security Operations Center Success

Multifactor Authentication Improves Security, but It Requires a Strategic Approach

A Layered Approach Can Boost the Security of VPN Access

More Attacks Are Originating on Endpoints and Antivirus Isn’t Enough

Key Components of the Zero-Trust Security Model

Misconfigurations Pose Cloud Security Risks