Editor writes on a blog article

The SoftwareONE Blog

SoftwareONE Blog

The blog features authors from across our company. They give insight into the latest technology topics, product releases or industry trends.

SoftwareONE Cyber Security Update 2019-10

Cyber Security Update - October 2019

Criminal cyber-activities come with only one goal: to attack your systems and to leave you with financial damages and reputational loss. In our October edition, we will cover latest data breaches such as a ransomware attack on several U.S.…

managed-security-teaser

Building an Effective Security Operations Center (SOC) at Your Organization

Many organizations simply do not have the resources and expertise available to build an effective in-house security operations center (SOC). Let’s take a look at how you can put together an SOC that can be maintained for years to come.

unified communications

Being Secure on the Super-Highway to Enterprise Collaboration

Unified communications (UC) has quickly become a staple of modern business culture, but it can bring Cyber-Security risks. Learn what these risks are, and how organizations can re-mediate them.

SQL 2008 end of support

Top Considerations When Building Your Roadmap for SQL Server 2008 End of Support

SQL Server 2008’s end of support disrupted many organizations. Learn how to proceed with your upgrade process by building a comprehensive SQL EoS roadmap.

Cyber-Security Bulletin September 2019

Cyber-Security Update – September 2019

This month’s edition informs about latest data breaches, a data-stealing Android malware, a master decryption key provided by the FBI, and cyber-threat intelligence updates such as multi-stage attack delivering backdoor to turn Elasticsearch…

Proactive Configuration Management: The Key to Good Cybersecurity

Proactive Configuration Management: The Key to Good Cybersecurity

Prioritize and protect mission critical assets with the help of our security expert team to build a proper cybersecurity strategy

{ "hideLoadMore": false }