Ryan Francis

Contributor

Ryan Francis has been in the tech publishing field for 17 years.

10 things to worry about when your vendor divests

10 things to worry about when your vendor divests

Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your...

Fragmentation: the silent killer in security management

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

7 universal rules of threat intelligence

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

Seven tips for developing a powerful data disaster plan

Seven tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

Disaster recovery: How is your business set up to survive outages?

Disaster recovery: How is your business set up to survive outages?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

Would killing Bitcoin end ransomware?

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

8 steps to regaining control over shadow IT

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

Why DRaaS is the better defense against ransomware

Why DRaaS is the better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

7 musts for any successful BYOD program

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

10 ways tech pros can take charge of their professional development

10 ways tech pros can take charge of their professional development

CompTIA, the technology industry’s leading trade association, has identified 10 abilities it believes IT professionals will need to be successful in the technology world to come.

7 musts for any successful BYOD program

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

How to eliminate insider threats

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.

5 things DevOps must do to secure containers

5 things DevOps must do to secure containers

Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications.

Tips on where to start in managing risk

Tips on where to start in managing risk

Caroline Wong, vice president of security strategy at Cobalt, provides a few tips for managing risk in today’s modern business environment.

Tips on where to start in managing risk

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

How much is a data breach going to cost you?

How much is a data breach going to cost you?

A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization. BitSight calculates the...

‘I will eliminate passwords’ in 2017

‘I will eliminate passwords’ in 2017

Like anyone else, security experts set up resolutions they hope to conquer in the new year. Now the question will remain, will they be able to follow through on them or -- like that diet people promised to hold to – will they go back...

How to ensure business continuity in a crisis

How to ensure business continuity in a crisis

IT resilience ensures business continuity in crisis, but only if executed with forethought and diligence. Todd Scallan of Axcient suggests applying any of these six tips to make IT resilient.

7 ways to tighten enterprise social media security.

7 ways to tighten enterprise social media security.

In this day and age when people share everything, there needs to be constraints in place to keep company secrets off Facebook.

10 top holiday phishing scams

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

Load More