Ironsphere Blog

Decentralized PAM Advantages and Challenges: Keeping Organizations Secure from Edge to Cloud

The debate on centralized vs. decentralized IT has been going on for decades, and there are solid arguments for both choices. The rise of the cloud changed everything, and today “shadow IT” continues to challenge CIOs and CISOs who are charged with protecting the assets of their organizations while also not restricting the number of productivity tools available which employees and contractors continue to find and use rather than using “official” applications.

Password Management in a New Era of Remote Working

2020 was a year of tremendous chaos and stress on many levels and stretched the limits of IT teams who were responsible for securing corporate assets, as entire companies sent employees home to work, including those same IT teams. A new generation of IT heroes was born, and CIOs, CISOs, and IT analysts and managers stepped up to address uncommon challenges, even as cyberattacks grew to all-time highs.

As Use of Telehealth Contact Centers Grow, Privacy must be Ensured

When the COVID-10 pandemic began, no industry in the world was put under more stress than the medical industry. With cases climbing, and more people constantly wanting information on what to do, the medical industry turned to technology to meet the demand.

Government Contact Centers and COVID-19: Security Challenges During the Pandemic

When the COVID-19 pandemic originally began, industries all around the globe were affected, as they had to swiftly and efficiently shift their operations to be done remotely, and the customer service industry was no exception. However, unlike other industries, contact centers had to make the switch while experiencing an unprecedented increase in the need for their services, as customer inquiries amidst the uncertainty of the pandemic skyrocketed.