Articles about IT Security

The Role of Threat Intelligence in a Comprehensive Security Strategy

Cybersecurity Isn’t Just an IT Issue

Why Endpoint Security Should be a Priority in 2023

Sidestep IT Hardware Shortages with Virtual IT Infrastructure

How AI-Powered SOAR Platforms Combat Automated Cyberattacks

Maximize the Value of Your Data Assets with Storage Tiering

4 Ways to Use Analytics to Combat Surging Levels of Cybercrime

How to Implement a Security Incident Management Framework

Automation Key to Improving Data Protection Compliance

Injecting Automation into Security Policy Management

Building Secure Apps with DevSecOps

Effective Identity and Access Management Is Critical to Security

The Rising Importance of Vulnerability Management

Technologent's David Martinez Interviewed for Patient Safety & Quality Healthcare Magazine

Technologent's Jon Mendoza Interviewed for Authority Magazine

Deepfakes Mean Deep Financial Loss for Banking and Payment Industries

Insurance Under Fire: Deepfakes and Cyberattacks Run Rampant

Deepfake Phishing: Is That Actually Your Boss Calling?

Ever-Increasing Threats Make Endpoint Security a Top Priority

Technologent's Jon Mendoza featured on the Dave Nemo Show

How Data Classification and Lifecycle Management Helps You Take Control of Your Data

Deepfakes Could Mean Deep Losses for Businesses If Not Prepared (featured on Yahoo! Finance)

Why Data Loss Prevention is an Essential Tool in Your Security and Compliance Arsenal

Technologent's Jon Mendoza featured in Insurance Journal

Deep Fake: Setting the Stage for Next-Gen Social Engineering

Technologent's Jon Mendoza featured in Insurance Journal

Technologent's Jon Mendoza featured in TechRepublic

Technologent's David Martinez featured in Tech Target

Why Aren’t More Organizations Automating Security Processes?

Addressing the Challenges that Limit Security Operations Center Success