<img height="1" width="1" src="https://www.facebook.com/tr?id=1953097804934218&amp;ev=PageView &amp;noscript=1">

Blog

Managing Shadow IT Risks by Building IT Resources for the Future

Shadow IT is a double-edged sword: It’s the greatest opportunity for innovation your company has, if the shadow IT risks don’t cut into your business first.

After all, cyber threats will very quickly wipe out any upsides shadow applications can deliver.

Topics: Security Tips

Shadow Technologies Drop Security Risks and Drive Business Value — if You Let Them

Shadow technologies can send a chill down the spine of any IT professional tasked with keeping an organization secure.

Topics: Security Tips

Three Benefits of Shadow IT — And How to Harness Them

What is shadow IT?

It helps to first define shadow IT, sometimes known as dark IT. Most would start with a rundown of the network security risks it presents, but a more helpful shadow IT definition would explain it as something that’s already happening in your organization.

Topics: Security Tips

Mitigating BlackNurse Denial-of-Service Attacks

In 2016, every company, no matter the size, has an online presence. Whether that is a website, online store front, perhaps a mobile app, or a mail server, chances are your organization has some kind of system in production on the Internet.

Topics: Support Security

ServerCentral's 2016 SOC 2 audit is now available!

Throughout many years of managing audit tasks and compliance programs, the most arduous part has always been gathering the proper artifacts.

  • Did we get the screen shot of one system right?
  • Where did I put that report from our vendor?
  • Who’s seen the monthly vulnerability scan reports?

Well, today ServerCentral took a large step toward making that process easier for our customers by putting our SOC 2 report online in our customer portal! 

Topics: Compliance Security Audit

The End of Safe Harbor And What Comes Next

Under European law, service providers are legally obligated to maintain the levels of security and privacy for personal, non-public information. Because of these protections, data from European users cannot be moved to jurisdictions where the same level of protection does not exist.

Topics: Security

5 Things I Learned about Cybersecurity at Chicago Ideas Week

This week I went to a talk on cybersecurity at Chicago Ideas Week. Here's what I learned from the former commissioner of the NYC police department, a Harvard Law professor, the global head of cybersecurity at Palantir, the cofounder and CTO of HackerOne, the founder and CEO of WISeKey, and the general counsel for Wikimedia:

Topics: Security

2015 Technology Infrastructure Predictions

Each year begins with one of our favorite traditions: prediction season. These technology-trend forecasts are always insightful, helpful, and in some cases, humorous. Here are some of the predictions for 2015 that stood out:

Topics: Other Security Disaster Recovery Products and Services

GHOST Vulnerability Update

The recently announced Glibc GHOST vulnerability (CVE-2015-0235) has been top of conversation and action since it was announced on Tuesday, January 27, 2015.

Topics: Security

Oodles of POODLEs, Or How Not to Get Bit

Often the biggest concern when a security exploit comes out is the time that elapses from when the issue is reported to the time when the manufacturer issues a patch. Will you be targeted in that brief unprotected moment? Can you ensure your customers will be protected if you're the victim of an exploit?

Topics: Security