Other IT Director

  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization

    Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization

    Discover best practices for mitigating internal risks in your organization, red flags to watch out for, top solutions for eliminating security vulnerabilities, and more in this e-book.

    Read
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    One of the biggest challenges customers face when they want to leverage and maximize the value of Salesforce Shield’s Event Monitoring is understanding the basic controls. In order to use the...

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    The California Consumer Privacy Act of 2018 (CaCPA) seemed to appear out of nowhere as it passed the desk of Gov. Jerry Brown. Since we’d be hard pressed to find a business that doesn’t somehow...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    A key component of the Salesforce Shield security suite, Event Monitoring allows organizations to boost data security and improve forensic investigations within their Salesforce orgs. Thousands of...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    GDPR, data breaches, a surprise California data privacy law, social engineering, and more: 2018 was a year of growing awareness of cloud data security threats, privacy considerations, and the...

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    By monitoring Salesforce data exports and reports run, you can quickly learn a great deal about how users are interacting with Salesforce -- and use those insights to strengthen your security and...

    Read
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. First and foremost is the loss of knowledge and the extra burden placed on remaining staff as you search for a replacement....

    Read
  • Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Securing personal data is at the core of the EU's General Data Protection Regulation (GDPR). Cloud applications, and Salesforce in particular, are rife with personal data. And while Articles 25...

    Read
  • What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...

    Read
  • Privileged Users in Salesforce: What Can They Access?

    Privileged Users in Salesforce: What Can They Access?

    Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. The two main areas of concern with privileged user abuse in...

    Read
  • 5 Ways to Gain Executive-Level Support for Building a Cybersecurity Program

    5 Ways to Gain Executive-Level Support for Building a Cybersecurity Program

    Cybersecurity has evolved from an IT project to a global concern, with The National Infrastructure Advisory Council warning of a catastrophic cyber-attack in the near future. Government and...

    Read
  • Privileged Users In Your Cloud Applications: Who Are They?

    Privileged Users In Your Cloud Applications: Who Are They?

    Privileged users of Salesforce, Office 365, and other mission-critical cloud applications are necessary to every organization. These are members of your organization who have more advanced...

    Read
  • FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    Here is Why We Selected Mainsail Partners in a Very Competitive Process for FairWarning  Read the Official Press Release Today, I am thrilled to announce FairWarning’s decision to accept $60...

    Read
  • loading
    Loading More...