eddaniel

28 Results / Page 2 of 4

Background

todayAugust 9, 2023

  • 73
close

CYBERSECURITY Ervin Daniels

How to Achieve a Robust Security Program 

It's not about if something bad happens to your business. It's the notion that a cyber attack will happen to your business. Business and Security leaders must focus more on risk mitigation than preventing cyber attacks. With the rise of cyber-attacks and data breaches, companies must be vigilant to protect [...]

todayMarch 24, 2023

  • 57
close

Identity & Access Mgmt. Ervin Daniels

Cybersecurity 101: Identity Security

Restricting access to computer systems requires a sure means of identifying authorized users. We access systems every day. We sign on to our laptops and mobile devices with passwords and passcodes. We type in our usernames and password to access Facebook, Twitter, TikTok, and Instagram. We connect from remote locations [...]

todayJanuary 11, 2023

  • 84
close

CYBERSECURITY Ervin Daniels

The C-I-A: An Agent for Cybersecurity

When people hear or see the letters CIA, they think of the U.S. Federal Government’s Central Intelligence Agency - CIA. However, those same three letters represent Confidentiality, Integrity, and Availability in Cybersecurity. In comparison, the Central Intelligence Agency serves and protects the U.S. Federal Government and the President. In contrast, the letters C-I-A serves as [...]
Cybersecurity Job

todayDecember 27, 2022

  • 79
close

CYBERSECURITY Ervin Daniels

Cybersecurity Jobs: A Workforce Shortage

Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. Demand for cybersecurity specialists has soared in the last decade. However, a dangerous shortage of cybersecurity workers in the United States puts our digital privacy and infrastructure at risk. Numerous factors are contributing to [...]

todayDecember 23, 2022

  • 73
close

CYBERSECURITY + DATA PRIVACY & COMPLIANCE Ervin Daniels

ZERO TRUST: HYPE OR HOPE?

During these times, the term Zero Trust has exploded. The Zero Trust term has become misunderstood, and it's becoming a bunch of hype to a lot of businesses, and they think it's just a buzzword that adds much confusion to its definition. However, the term has been around for years, [...]

todayJuly 26, 2021

  • 97
close

CYBERSECURITY + CLOUD SECURITY Ervin Daniels

Cloud Adoption: How to Enable a Secure Architecture

Cybersecurity must be a forethought, not an afterthought for application and data security architectures. Security has to be "baked" into your application development process. Before you build applications, migrate applications to the cloud, and modernize your applications, the cybersecurity team must have a seat at the table from the very [...]

todayJuly 17, 2021

  • 101
close

FEATURED + CLOUD SECURITY Ervin Daniels

The State of Cloud Adoption: Are You Rethinking Security?

Cloud adoption is accelerating. It's no surprise that the cloud unlocks tremendous business opportunities, but moving to the cloud requires organizations to rethink security. It begins with understanding the adoption model.  In a traditional model, the organization would own and manage 100% of its workloads. The ownership and management of [...]

©2020 Ervin Daniels. Designed By Tru Brand Media Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of IBM.

error: Content is protected !!