IT security Archives - HyTrust
https://hytrust.com/uploads/cont_comp_header.png

IT security

Securing the Control Plane

Infrastructure Security is primarily comprised of the following: Control Plane Security Endpoint Security Network Security Control Plane Security: The focus of this blog post is around securing the management platforms used for provisioning the compute/network/storage infrastructure. The various business applications/services run on the infrastructure provisioned using management platforms. As customers adopt a multi-cloud strategy they […]

Read More

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Read More

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Read More

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Read More

It’s Virtually Impossible to Write a $100 Check

Stop and think what it takes at your company for someone to write a $100 check from the company checkbook. It doesn’t seem like a lot but there are controls in place to make sure that it is not easy to write that $100 check, controls meant to protect the company from fraud, theft and […]

Read More

Do Your IT Security Standards Put the “No” in Innovation?

It’s an unfortunate fact that the people you put in charge of innovation often see those in security as members of the cult of “no.” The security team may stick to rigid policies or keep closed minds when it comes to new ways to enforce security policies that will make it easier for the creative […]

Read More

Local Software vs. Automated Virtual Appliances: IT Security and Threat Management in 2015

If there’s one good thing to come out of 2014’s rash of security breaches, it’s increased awareness and more serious treatment of security in budgets. Greater financial resources bring important IT improvements, but also enhanced accountability for threats. As a result, more foresight than ever is required. The best way to prepare for the future […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.