Case Study: Real-World Breach Response [Webinar]

Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to...

A Case for Cloud Security: Capital One Breach

Capital One filled the headlines as an estimated 106 million credit card customers and applicants woke up to news that their personal data had been accessed by an outside attacker. Among this...

Securing Privilege and Containing Attacks on Endpoints [Webinar]

Watch as CyberArk's Endpoint Privilege Manager (EPM) Business Lead Todd Moseley and Sales Engineer Brance Spradlin discuss CyberArk's Endpoint Privilege Manager - the endpoint security solution...

Now is the Time to Move to Azure

Change is something every person and organization must deal with over time. In the tech world, change means more advancements, more capabilities, and more to learn. Time for change may be now if...

ICYMI - "Cybersecurity Heavy Hitters" An Expert Panel Event

On a day where thunderstorms filled the weather forecast and the Houston Astros prepped for a Game of Thrones themed night, IT professionals from various industries across Greater Houston made...

Micro-segmentation is achievable. What's stopping you? [Webinar]

Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:1. The...

Accudata + Forcepoint Security Series | Risk-Adaptive Protection [Webinar]

What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. 

Why Most Companies Fail at Cloud Security [Article]

Companies have come to realize just how powerful cloud services can be for their business. However, using the cloud is a double-edged sword: without applied security controls, the cloud can be a...

Modernize with F5 [Article]

By Amy Megill, Editor

Cybersecurity in the Energy Industry - Midstream Connect [Interview]

Accudata’s Security Principal Consultant, Jay McMickle sat down with Midstream Business to discuss cyber security from an energy perspective. Jay spoke on everything from the growing trends in...

1 2

Accudata is ready to help your organization secure, modernize, and grow through the use of leading-edge technology solutions. Contact our team to start today!

LEARN MORE