We recently welcomed veteran technology marketing executive, Steve Harrington, to the Cygilant team as vice president of marketing. Prior to joining Cygilant, Steve worked at Extreme Networks where he was vice president of marketing. I recently sat down with Steve to discuss his new role and decision to join the Cygilant team, and get to know him better as a person, including what makes him tick. Following is a transcript of our discussion.
Click here to view the formal announcement on Steve’s appointment and Cygilant’s new headquarters in Burlington, Mass.
We are excited to announce our new Blog and Video series called, “From the Phones”.
There is nothing like hearing from the person who is on the phone, speaking with hundreds of customers every month. This is where the true rubber meets the road. The learnings that can be gained from tapping into this audience are tremendous. And, we are pleased to share that information with you.
A report from Gartner announced this week on DarkReading found that nearly one out of three companies don’t have on-staff cybersecurity expertise. Gartner research director Rob McMillan and principal research analyst Sam Olyaei compiled the 2018 CIO Agenda Survey from over 3,000 respondents the article said. And while more organizations have cybersecurity staff than previous years, one third are still lacking a dedicated resource.
In a recent article for Forbes, Dave Lewis recalls an experience earlier in his career in which the physical access controls to production servers were completely undermined by lack of proper network segmentation. In the article, he notes that traditional network segmentation is now being replaced with movement towards “zero trust.” The concepts of “inside the network” versus “outside the network” are melting away as organizations steadily move towards cloud-based and hybrid infrastructures.
Software patches provide a critical role beyond providing reminders to end users. Their purpose is to fix bugs and vulnerabilities that are present and to create a safer, more secure computing environment. Applying these patches is critical for organizations to reduce the risk of data breaches or compromise; however, due to the sheer number of patches or vulnerabilities that are found, it is often difficult for organizations with even moderately complex environments to perform this function.