Michael Diehl, Author at SC Media

Michael Diehl

Most recent articles by Michael Diehl

Product Reviews Opener – Email Security

Email is one of the largest communication methods available, so it is no wonder it’s among the favorite attack vectors to target. Organizations rely on email to keep their businesses running, but very few place the importance on properly securing it. Email security refers to the collective measures used to secure the access and content…

Vendor risk management

The SC Labs team this month took a deep dive into vendor risk management (VRM) solutions. According to Gartner, VRM is the process of ensuring that service providers and IT suppliers don’t create an unacceptable potential for business disruption or negative impact on business performance. Michael Diehl While our team regularly looks at GRC solutions,…

Cloud-based security management

Over the past few years there has been quite a bit of conjecture around the security market and how it will continue to evolve. Security professionals have started to find their own real success against hackers comes from using the same tools and techniques as hackers to turn the tides. Mike Diehl Increasingly, security products are…

Cloud-based security products – Group Test

This month we focused on five products in the cloud-based security space that solve a problem almost every organization faces – the ability to have a broad security solution that can span over a multifaceted infrastructure environment whether it’s sitting in AWS, Azure, Google Cloud Platform, virtual environments or bare-metal on-premises machines. Mike Diehl Some…

A note on file encryption

With all the data breaches in the news lately, you’ve probably heard the word “encryption” more times than you’d like. In layman’s terms encryption is a method of protecting your data so that only the people that you intend to see the data have access to it. This can be done while that data is…

SC Media Labs January Product reviews

The need for encryption will differ in every business. It’s important to understand the right kind of encryption that needs to be implemented, while buying a product without unnecessary features that your organization may not necessarily need. File encryption allows you to encrypt files and folders, it remains data-centric and uses a key sharing methodology,…

GRC, risk and policy management

This month we take a dive into GRC (governance, risk and compliance), risk and policy management toolsets. The SC team has looked at this category on an annual basis for many years. Over the years focus in the space has come in waves, especially as regulatory and industry-specific compliance measures evolve. With the broad reach…

Risk and policy management

Current risk and policy management tools have continued to evolve, year after year offering new features and increasingly interesting approaches. There is some overlap with the tools we feature this month, but they fall into two main subcategories: GRC solutions and policy management tools. GRC solutions are designed to help assure an organization achieves its…

Threat Intelligence Group Opener

Focusing on threat intelligence solutions this month, the team observed three primary solution categories – threat intelligence providers, platforms and gateways. These three classes all provide threat intelligence to an organization, though each type takes a different approach when packaging the information.

Next post in Reviews