The View From NCS Technologies

Mike Turicchi

Recent Posts

Accelerating Healthcare Research with Leidos and Azure Confidential Computing

Posted by Mike Turicchi on Apr 3, 2023 12:18:47 PM

Sharing and aggregating real-world patient data and evidence is crucial to driving better healthcare outcomes. How does Leidos do it? In this video, the science, engineering and technology organization shares its experience using Microsoft Azure to achieve its desired outcomes while ensuring patient privacy and the security of medical records. Watch the video to see how Leidos uses Microsoft Azure confidential computing and Intel Software Guard Extensions to accelerate clinical trials and gain new insights.
Read More

AMD PRO Processors Mean Business

Posted by Mike Turicchi on Apr 3, 2023 10:30:36 AM

Ready for PC performance that takes it up a notch? Watch this intriguing video about the AMD Ryzen™ PRO 6000 Series processors, which feature up to eight high-performance cores built on advanced 6nm technology. Make sure your next business PCs are equipped with this powerful microprocessor to ensure your employees get the speed, security and responsiveness they need.
Read More

HP Wolf Pro Security

Posted by Mike Turicchi on Mar 28, 2023 10:25:29 AM

Small and mid-size businesses are special targets for cyber criminals because they often don't have the latest security protections. See why that's important from this datasheet by HP Wolf Security, the full-suite endpoint security solution built with simplicity in mind.
Read More

The 'New Normal' Also Applies to the Cyber Threat Landscape

Posted by Mike Turicchi on Mar 27, 2023 5:28:34 PM

The term "new normal" is thrown around a lot. Ways of work have fundamentally changed as organizations embrace work-from-home and hybrid work models, motivating threat actors to adopt a different breed of "new normal" in efforts to adapt. In this blog, findings from a Deep Instinct report on threat landscape trends are shared in the context of what that means to the organizations in their crosshairs. Read the blog for an overview and get in touch to discuss how NCS Technologies, Inc. can help your organization thrive in the era of hybrid work.
Read More

How Cybersecurity is Playing a Role in the Ukraine-Russia Conflict

Posted by Mike Turicchi on Mar 27, 2023 3:20:52 PM

There's more to the Ukrainian-Russian conflict than meets the eye. Behind the scenes, cyber armies on both sides are waging war against government and military networks with waves of phishing attacks, using intelligence from trusted sources to identify what to protect and what to target. Meet the modern threat landscape, escalated. Watch this video and contact us to discuss how NCS Technologies, Inc. can prepare your organization to navigate new threat norms in your digital environment.
Read More

Design of Secure PC Endpoints: An Intro to HP Wolf Security

Posted by Mike Turicchi on Mar 27, 2023 12:30:21 PM

Zero-trust approaches are now recognized as the best solution for endpoint security. This is especially true in today's distributed workforce where so many employees are working outside the office and need high-level security solutions. Download this analyst report showing the value of endpoint security in this new era and how HP Wolf Security fits into the equation.
Read More

Balance Endpoint Protection and Productivity through Zero Trust

Posted by Mike Turicchi on Mar 27, 2023 10:29:24 AM

Businesses and organizations are adapting to a quickly changing workforce environment that requires extra attention to security in today's era of multiple cyber threats. Download this timely analyst report from Forrester showing that the best way to limit cyber risks is to adopt a zero-trust strategy for endpoint devices.
Read More

Azure Defender for IoT

Posted by Mike Turicchi on Mar 25, 2023 5:10:09 PM

Comprehensive security across all IoT/OT devices has become a critical component of overall network cybersecurity. Watch this video demo for a detailed walkthrough on Azure Defender for IoT which allows continuous asset discovery, vulnerability management, and threat detection for your IoT devices and operational technology (OT) environment.
Read More

Azure Defender for IoT helps Global Geological Materials Company Secure Production and Bridge the IT/OT Gap

Posted by Mike Turicchi on Mar 25, 2023 12:10:15 PM

Keeping pace with digital transformation isn't easy, particularly when your company is mainly focused on pulling rocks from the ground. This customer success story highlights how an IoT security solution became a top priority for global lime and minerals producer Lhoist to keep digital transformation from stalling. Microsoft Azure Defender for IoT has enabled Lhoist's critical OT equipment to be more connected to the plant's IT network, which is in turn connected to the larger organization's corporate IT network. With 80 plants in more than 25 countries, this unifying of IT security with industrial automation was a critical factor in the company's continued digital transformation evolution. Read the story to learn from Lhoist's experience.
Read More

Holistic Endpoint Security Requires Built-In Hardware-Based Defenses

Posted by Mike Turicchi on Mar 25, 2023 10:10:10 AM

Developing an effective security plan that protects far-flung devices in hybrid workspaces isn't easy. Cybercriminals just need one door open at an endpoint to compromise your systems and steal valuable data. Download this thought-provoking HP whitepaper detailing how hardware-based root-of-trust technologies that deliver security below and within operating systems offer the best protection.
Read More