Microsoft to Invest $1 Billion Annually in Cyber Security

Veteran software company Microsoft might be most well-known for its Windows PC operating systems, but in recent years the company’s Azure cloud platform has become remarkably successful as well. According to Microsoft’s latest quarterly earnings report, revenue from Azure has grown by 93 percent year over year. The service’s user base, meanwhile, has more than… Read more »

Google Launches New, Simplified Encryption Service

Following a year of high-profile hacks and security breaches, it’s clear that app and web developers still have a lot of work to do when it comes to data security. Failures to properly secure sensitive data can constitute serious liabilities for both developers and their users. Unfortunately, many developers struggle to implement and manage the… Read more »

How Can IT Outsourcing Benefit Your Business? [Infographic]

Young start-ups and mid-sized businesses might have plenty of ambition, but they may not have the resources to hire and maintain their own in-house IT department. Unfortunately, this means companies are often forced to make compromises that increase their risk of service outages and data breaches. The good news is there’s a second option. Companies… Read more »

IBM’s Watson Gets Its First Cyber Security Internship

Since it was first introduced in 2006, IBM’s Watson supercomputer system has become a champion on Jeopardy, helped doctors assess lung cancer treatment options, and analyzed satellite imagery to aid in California’s water conservation efforts. What sets Watson apart from most other supercomputers is its ability to “learn” new information and respond to complex inquiries…. Read more »

How Can a Managed Help Desk Benefit Your Business?

For companies that rely on IT infrastructures to do business, it’s important to have a devoted team to troubleshoot technical issues if and when they inevitably arise. Unfortunately, many small and medium sized businesses don’t have the resources to devote to developing and maintaining an in-house IT department. This can not only make it hard… Read more »

Choosing Between Dedicated Servers and Cloud Hosting

So you’ve developed a new SaaS application, and you’re almost ready to push it out to your user base. First, you have to decide where and how you’ll host your application. Cloud hosting services have become for more affordable and accessible in recent years, but that doesn’t mean you should totally discount the idea of… Read more »

What Cyber Security Role Do You Want to Play?

Let me preface this post by saying that this is just one perspective. There are many ways to categorize roles in cyber security, and all of them will be accurate. For the purposes of this discussion, at this time, I propose the following as a framework: Through our work with the Greater Phoenix Chamber of… Read more »

Don’t Overlook the Security Risks of Your Mobile Devices

As of early 2015, more than half of all emails were opened on mobile devices. While many of these emails are personal correspondences, more and more companies are doing business on mobile devices as well. Some companies even provide work-specific smartphones to their employees from which to do business. Unfortunately, many companies are woefully unprepared… Read more »

Mitigate Damage From Hackers With an Early-Warning System

As we wrap up Cybersecurity awareness month, Arizona political leaders recently quoted British journalist Misha Glenny as saying, “There are two types of organizations, ones that were hacked and ones that don’t know they were hacked.” The DynDNS DDoS attack was certainly a reminder of how interconnected we are, and how reliant we are on… Read more »