How to Foil the 6 Stages of a Network Intrusion

The cost of a breach is on the rise. A recent report from IBM revealed that the average cost of a data breach had risen 12 percent over the past five years to $3.92 million per incident on average. Additionally, this publication uncovered that data breaches originating from malicious digital attacks were both the most common and the most expensive types of security incidents.

How to Choose Your Cloud Provider

With the emergence of Amazon Web Services (AWS) in 2002, the Infrastructure as a Service (IaaS) model kickstarted the public cloud revolution that has permanently changed how IT services are deployed and delivered. According to Gartner’s July 2019 Magic Quadrant for Cloud Infrastructure as a Service report, the annual cloud IaaS market is currently worth $41.4 billion and is expected to grow to $81.5 billion by 2022.


Raytheon recognizes Cloudera for technical excellence

We are excited to announce that Raytheon has recognized Cloudera Government Solutions Inc. (CGSI) with an EPIC Supplier Excellence Award for its outstanding quality of work, performance and innovation. EPIC awards are awarded to suppliers who have demonstrated superior achievement for Raytheon and demonstrated overall excellence in performance, innovation, and collaboration. Only the highest-achieving suppliers are awarded this distinction.


Five Ways Cyber-Attackers Are Using AI to Their Advantage

Industries far and wide are raving about all of the ways that artificial intelligence can help transform the world into a more efficient and productive environment. Within cybersecurity, AI is already leaving a lasting impact. Today it is already being used to alleviate the industry's talent shortage by automating processes, increase the accuracy of alerts, minimize false positives in technology, cut down investigation times during incidents, eliminate the need for passwords, and more!


DNSSEC: What Is It and Why Is It Important?

The Domain Name System Security Extensions (DNSSEC or DNS Security Extensions) is a set of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks. DNSSEC provides DNS resolvers origin authentication of DNS data, authenticated denial of existence and data integrity but not availability or confidentiality.

eg innovations

What is Synthetic Monitoring?

Organizations depend on fully functioning IT systems and processes to attract customers, deliver services and manage internal operations. The operation of these systems and processes directly impacts the business and reputation of each organization. Ensuring that all IT systems and processes are fully functional 24×7 is a key component of any organization’s IT performance management strategy. This is where synthetic monitoring comes in.


The Joker's in town. Time to secure your Android devices

Security experts from Google have discovered a new spyware in 24 Play Store apps that, combined, have more than 472,000 downloads. Researchers have stated that this spyware also has the capabilities of normal malware and appears to have infected certain apps in Google Play with more than 100,000 installations. Cybercriminals are deploying this spyware through the advertisement framework in those compromised apps.