You searched for legacy systems | SC Media

Your search for legacy systems returned 69 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Opinion remove

Your search for legacy systems returned 69 results

Sort Results:

Relevant Recent
Security News

User Administration with Active Directory

Keeping an organization safe from potential security breaches and costly downtime involves knowing who has access to what parts of the infrastructure and how changes were made to group policies or to user account information. Many IT organizations have already made the long journey from legacy systems to Active Directory (AD) or are well on their way. Having spent time preparing for the pitfalls and pains of migrations, corporations have often forgotten why they set forth on the journey in the first place. The promise of Active Directory has always been to lower the costs of user administration, but sometimes it is unclear how best to achieve these ends. For many organizations, the two most overlooked areas are group policies and the secure delegation of tasks.
Executive Insight, Opinion, Security News

What does the SharePoint 2010 end of life mean for users?

SharePoint 2010 will reach end of life (EOL) on October 13, 2020. As Microsoft prepares to sunset the collaboration platform, users need to know what steps to take before extended support is no longer available. If your organization is still using SharePoint 2010, keep reading to learn everything you need to know before the shutdown.…
Executive Insight, Opinion, Security News

Securing multi-cloud environments: assurance through consistency

Meeting the security and compliance needs across different cloud service providers (CSP), and an organization’s own data center, remains a thorny challenge. Today, many enterprises are migrating business-critical workloads to the cloud, or have done so recently. Others are taking a ‘lift-and-shift’ approach for select applications, leveraging new integrations for legacy systems. This journey may…
Executive Insight, Security News

The Digital Unraveling: Vigilantes, Rogue Competitors, Big Break Ups, and Broken Trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed online with ever-decreasing time to fix…
Executive Insight, Opinion

The digital unraveling: Vigilantes, rogue competitors, big break ups, and broken trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed online with ever-decreasing time to fix…
Executive Insight

From ransomware to social media to the cloud: The Top 5 phishing challenges for 2018

By many measures, 2017 was a rough year for cybersecurity with large, brazen phishing attacks negatively impacting governments and companies around the world. Even some of the most supposedly cyber-secure organizations such as Google, Yahoo, Verizon, Virgin America and Equifax fell victim to large data breaches in the past year. As expected, the onslaught of…
Executive Insight

The Truth About Mainframe Security – And Where You Should Be Focusing

Have you ever noticed that technology is the only industry where the term “legacy” carries a negative connotation? In recent months, so-called legacy systems – most notably the mainframe – have drawn much unwarranted ire, particularly in the government sector. Mainframe technologies are outdated, not compatible with modern security approaches and represent a major risk,…
Next post in Opinions