<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

Topic: Security

January 15, 2019 | Security

What can a vCISO do for your organization?

Organizations, big or small, are all grappling with combating the onslaught of security attacks, making security a top priority for today’s IT teams in every vertical. As Forbes so broadly states, “Cybersecurity is applicable to every business operation, whether it’s in the military, corporations or entrepreneurs.” And while cybersecurity...

January 10, 2019 | Digital Transformation

What’s Driving IT Budgets in 2019?

Many IT leaders expect to see their budgets to increase or remain unchanged.  This is driven largely by the need to upgrade aging infrastructure, accelerate digital transformation via a shift to the cloud and enhance their overall IT security...

December 11, 2018 | Security

Who Owns Cloud Security?

 Organizations are rapidly embracing cloud services to gain agility and thrive in today’s digital economy. This has created a strategic imperative to better manage cybersecurity risk while keeping pace at scale as firms move critical apps to the...

December 04, 2018 | Security

It’s the Happiest/Scariest Season of All!

It’s that time of year, where twinkling lights and Santa’s sleigh full of toys are everywhere. But with all of the holiday bustle comes additional risk, the risk of mounting security threats as shoppers are eagerly swiping their credit cards...

November 07, 2018 | Cloud

Everyone Has a Role in Cloud Security

Outsourcing is becoming an increasingly popular business strategy. By carving off business processes and giving them to outside vendors companies save money and resources. Outsourcing enterprise computing processes using cloud services, for...

October 09, 2018 | Security

The Big Chinese Hack – What do we know, and what should we do?

There has been a lot of chatter the past several days around a POTENTIAL hack via a China-based manufacture chip.  Yet, despite all the clamor, there are mixed reports about how real this is.

October 02, 2018 | Security

Using SIEM to Combat Alert Fatigue

Early detection, rapid response, collaboration to mitigate advanced threats imposes significant demands on today’s enterprise security teams.

September 13, 2018 | Security

Choosing a Security Framework

 Running a security program can be an overwhelming task. There are so many factors to consider including: encryption, application security, disaster recovery and let’s not forget adherence to compliance mandates such  HIPAA and PCI DSS .  How...

August 21, 2018 | Security

Security vs Compliance ... is there truly a difference?

It’s no secret... security attacks are the rise:

July 31, 2018 | Security

It’s Time to Get Back to the Security Basics

If there’s any constant in today’s technology landscape, it’s change. And when it comes to security, there’s no rest for the weary. Advancing technology, savvier-than-ever users and the onslaught of attacks are making today’s IT teams scramble to...