IT Focus Area: strategy
June 9, 2017
The 5 Most Popular Articles in May 2017
1. 8 Steps to an Effective Vulnerability Assessment
Examine vulnerability assessment in the context of your business by following these key steps.
2. Mobile Device Security in the Workplace
Mobile devices in the enterprise can pose major security risks. Here are five important risks worth examining and one key challenge to overcome.
3. 10 Keys to Choosing a Data Center Colocation Provider
Moving into a colocation facility can help you cut costs, be more agile and increase your power density. But picking the wrong facility can cost you. Find out what you should look for and how to make the right decision.
4. Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Learn what these landmark regulations have in common, how your organization can use them to increase consumer trust, and how to be more resilient going forward.
5. The Top 3 Cloud Computing Service Models
There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
To receive these results in your inbox, subscribe to the Monthly FOCUS Digest e-newsletter.