

Ed Tittel
Ed Tittel has been working in and around IT for over 30 years and has been a Windows Insider MVP since 2018. The author of more than 100 computing books, Ed is perhaps best known for his Exam Cram series of certification prep books. These days, Ed blogs weekly for GoCertify.com and more often than that at Win10.Guru. To learn more about Ed, visit his website at edtittel.com.

What your cyber risk profile tells insurers
The purpose of a cyber risk profile is to assess your organization's insurability. The work you do upfront can go a long way toward ensuring you get adequate cyber insurance coverage and a better rate to boot.

What is cyber insurance and why you need it
Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

5 tips for defending against advanced persistent threats (APT)
APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared to do battle against an APT? You better be.

The top 6 Governance, Risk and Compliance certifications
CEOs are always on the lookout for dependable folks who can identify potential exposures and quantify the impacts of risk on an organization while protecting the interests of employees, shareholders, other organizations and the...

Your guide to compliance in the cloud
You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

How better log monitoring can prevent data breaches
Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes?

How to explain the cloud to end users
'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...
Leading-Edge UTM: What C-Level Execs Need to Know
Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the...
How to ensure SAM and SLM compliance in mobile environments
Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.
5 ways to prevent data loss in mobile environments
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...
7 enterprise mobile security best practices
These seven tips will help you secure your mobile environment without placing a burden on your workforce.
-
eBook
Sponsored -
White Paper
-
White Paper
-
Solution Brief
Sponsored -
Analyst Report
Sponsored