Blog
Addressing Risk at Scale Using CSPM Tools
Managing cyber risk on a global scale through one global security policy means more security and compliance efficiency and less cyber risk. CSPM tools offer this potential.
View MoreWith 10 years of experience, Ryan Smith serves as VP of Product at Armor; he is passionate about telling stories about how companies are achieving security and compliance in the cloud. Ryan regularly speaks nationwide at conferences, user groups, and special events on the topics of cloud security, compliance – PCI, HIPAA, and GDPR, and developing secure cloud architectures. Previously, he served as Director of Product Marketing and Sr. Product Manager focused on bringing Armor Anywhere (a managed, scalable security solution that protect virtual machine instances hosted on public, private, hybrid or on-premise cloud environments) and its future iterations to market; he also has been an integral part of developing Armor’s compliance matrix mappings and the industry defining cloud adoption framework for HIPAA compliance. At prior companies, he served as the Founder, Head of Product or Marketing Manager for various SaaS businesses. Ryan holds a PhD in Mass Media and Communication Studies from European Graduate School.
Managing cyber risk on a global scale through one global security policy means more security and compliance efficiency and less cyber risk. CSPM tools offer this potential.
View MoreCompanies can better protect information by employing multifactor authentication (MFA) controls within their security program. This blog defines MFA and lays out common methods and benefits.
View MoreThis blog will illustrate how cybercriminals are weaponizing AI and ML and how Armor is employing AI and ML within our own platforms.
View MoreAre artificial intelligence and machine learning the next great hope for humanity and businesses? Or the next great threat? In part 1, we will examine what they are and how they work together.
View MoreSECaaS solutions are comprehensive, system-wide solutions to cloud-based vulnerabilities, and integrate a complete suite of security services into one platform.
View MoreLooking back at trends from the past year helps us see how the cybersecurity industry has transformed, and also allows us to look at where it may be headed.
View MoreRobust log management is central to cybersecurity, operational visibility and more. Learn about the fundamentals of log management and log management services.
View MoreTo combat the “fake news” about the cloud, Armor’s latest blog debunks common cloud migration and cybersecurity myths.
View MoreLogging is data overload. Armor explains logging in today’s cybersecurity world, and how they’re overcoming these challenges.
View More