figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

slider item
Zero Trust Access Management
Cloud Security Basics, Best Practices & Implementation
Guest Writer 30.05.21

Cloud security is a set of controls, policies, procedures, and technologies that protect data, infrastructure, and systems that are stored in cloud environments.  Cloud security measures give businesses the processes and tools they need to keep their data safe, meet their regulatory compliance requirements, protect their customers’ privacy, and establish authentication rules around all of […]

Read more
slider item
Zero Trust Access Management
How to Build IAM with Zero Trust
Guest Writer 30.05.21

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access management […]

Read more
slider item
Compliance Automation
Once Upon a Framework – An Introduction to SOC 2
Guest Writer

SOC2 is today the de-facto standard in security compliance frameworks. Complying with it is an important factor in passing your quarterly and annual financial audits. This is because nowadays security determines, to a great extent, whether or not your business will exist and grow. How did it come to be, and why, exactly, should you […]

Read more
slider item
Compliance Automation
This is the Only SOC 2 Checklist You’ll Ever Need
Guest Writer

The Only SOC 2 Compliance Checklist You’ll Ever Need Are you chasing an endless trail of screenshots? Awake at 3am, stressed about bugging your stakeholders for evidence–again? Wondering why you decided that this dang compliance framework was worth it? Congrats! You must be preparing for a SOC 2 audit. Soc 2 Compliance Checklist – How to Prepare […]

Read more
slider item
Compliance Automation
Cloud Compliance 101
Guest Writer

InfoSec Compliance is a big word, involving most systems in your working environment, and multiple deliverables to be produced for the auditing team. Up till today, this project was as complex as can be. Today, with the introduction of Compliance Automation Platforms, things get simpler. Here’s a list of what you need (and don’t need […]

Read more
slider item
Compliance Automation
Life Is A Checklist of Checklists
Guest Writer

Daily Chaos, By Design We all know how security compliance works. It’s one of those processes no one dares to disrupt. As InfoSec leaders, after having our morning coffee, we quickly move to our emails, going through those routinely generated reports, which leads us to believe that the procedures and controls are still in place […]

Read more
slider item
SOC as a Service
GlobalDots & CloudFlare Introduce SOC-as-a-Service
Li-Or Amir 26.05.21

The increasing difficulty in recruiting in-house security engineers has created a wide demand for Security Operation Centers as-a-service, especially in fast-growing organizations. “It’s hard to overstate the extent to which online has become the most important channel for many businesses,” says CloudFlare. “Dealing with today’s volume of data, you need a reliable mechanism to sift […]

Read more
slider item
Your Innovation Feed
GlobalDots BrightTalk Feed
Li-Or Amir
Read more
slider item
Compliance Automation
Startup-Speed Products with Enterprise Grade Compliance
Eli Arkush 25.05.21

Let’s face it – Security compliance is a hassle. (Almost) nobody likes it, it’s boring and perceived as a tedious checklist that must be completed in order to achieve the prestigious mark of being “XYZ” compliant. Why is that, and how can we better tackle this challenge? The Compliance Challenge Companies need compliance mainly for 2 […]

Read more
slider item
Identity & Access Management (IAM)
Automated Workflows – IT & HR Dreams Come True
Eli Arkush

At times when interest rates are close to zero and VC money flows into startups and tech companies, we see a spike in the recruitment pace of talented knowledge workers. The competition for software engineers, developers, DevOps, SREs, and security engineers is fierce. Therefore, companies put lots of effort into optimizing their employee experience, also […]

Read more
slider item
Bot Mitigation & Anti-Fraud
Formjacking Webinar: GlobalDots x SourceDefense
Li-Or Amir 06.05.21

Crush Formjacking: Ensuring Website Protection and PCI Compliance Abstract: Magecart is an umbrella term for dozens of criminal groups that place skimming code in the Javascript of websites to intercept data typed into forms. This practice, known as Formjacking, is one of the leading threats facing e-commerce today. However, experts predict we haven’t seen the […]

Read more
slider item
Monitoring, Logging & Observability
Developer-Native Observability – Solution Brief
Li-Or Amir 29.04.21

An advanced solution which saves developers time and headaches, increases productivity and enables faster reaction to production issues, even while the service is running. Fill out the form to get your copy.

Read more
slider item
Identity & Access Management (IAM)
4 Credential Phishing Myths You Can’t Ignore
Li-Or Amir 28.04.21

Credential phishing is the practice of stealing user ID/email address and password combinations by masquerading as a reputable or known entity. Attackers then use the victim’s credentials to carry out attacks on a secondary target, such as breaching into enterprise networks. GlobalDots, in collaboration with Identity Governance market leader Okta, gathered 4 common misconceptions which lead […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure