Loading...

Loading...

Security

38 articles

Latest

GDPR a year later: Five key takeaways and lessons learned

Posted by Bob Bruns on July 2, 2019

Bob Bruns looks back at the past year with GDPR and shares a few key insights about the experience as well as some practical lessons learned.

READ MORE

3 ways modern security drives value to the business

Posted by Chris Miller on June 21, 2019

Whether you are looking to improve productivity, modernize operations or deliver a more compelling customer experience, security drives measurable, significant business outcomes.

READ MORE

5 reasons to simplify your security landscape today

Posted by Chris Miller on May 21, 2019

Find out the top 5 reasons security professionals need to take complexity seriously.

READ MORE

Why you need better incident response – and how to do it (Part 2)

Posted by Nate Zahedi on April 29, 2019

This is the second of a two-part series on incident response (IR) covering the best practices for assembling and executing your own IR plan.

READ MORE

Five tech trends driving cybersecurity in 2019

Posted by Bob Bruns on April 23, 2019

Bob Bruns shares the 5 things he believes will play a pivotal role in cybersecurity in the coming year.

READ MORE

Cloud requires a new approach to security

Posted by Chris Miller on April 15, 2019

Whether you’re planning a migration to the cloud or trying to optimize the control of your existing cloud infrastructure, consider the 5 factors in this blog to ensure you’re doing so securely.

READ MORE

Swimming upstream: How not to fall prey to phishing scams

Posted by Nathan Boddam-Whetham on April 8, 2019

Nathan Boddam-Whetham shares some advice on how not to fall prey to phishing scams.

READ MORE

Why modern security begins with ‘people first’

Posted by Chris Miller on March 26, 2019

Chris Miller explains why you can’t modernize security without securing your people.

READ MORE

Why you need better incident response – and how to do it (Part 1)

Posted by Nate Zahedi on March 13, 2019

Learn more about the risks of not being prepared, and the benefits of a fully-fledged IR strategy.

READ MORE

Why CISO’s need to appreciate the full identity picture in 2019

Posted by Chris Miller on January 21, 2019

How Privileged Access Management (PAM) fits into a larger, holistic identity solution.

READ MORE

Avanade Insights Newsletter

Stay up to date with our latest news.

image for contact-us

Next steps

Talk to us about how we can bring the power of digital innovation to your business.

CLOSE
Modal window
Contract
Share this page