Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

11:11 Systems

11:11 Systems wins 2024 Cloud Computing Product of the Year Award

Technically awards season has ended, at least when it comes to Hollywood. There. were some big wins for Oppenheimer, and who wasn’t feeling the Kenergy? 2024 is also shaping up as a big year for 11:11, as we’ve already brought home several awards. And now we have been awarded the 2024 Cloud Computing Product of the Year Award for 11:11 Cloud , presented by presented by Cloud Computing Magazine.

World Backup Day and the Importance of Being Prepared

It’s been nearly 365 days since the last World Backup Day, and we’ve got a lot to discuss. Let’s see, I completed my annual rewatch of The Sopranos. I took a deep dive into the SEC’s new cybersecurity rules and the nature of “materiality.” My wife and I finally agreed on a new sectional for the living room. What else … OH YEAH AND WE HAD A KID. Like I said, it’s been quite the year.

Which Cloud Provider Is Secure By Default?

Much like our own blood, data is the lifeblood that flows through the arteries of business today. Organizations must ensure that data is protected appropriately based on that data’s sensitivity, criticality, and regulatory or contractual requirements. These protections are provided through administrative, technical, and physical controls. The primary goal of these controls is to provide preventative, detective, or corrective capabilities.

Making Sense of the SEC's New Rules for Cybersecurity Risk and Disclosure (Part II)

Earlier this week, we debuted our mini-series on the SEC’s new cybersecurity rules. In case you missed it — and, understandably, don’t have the bandwidth to backtrack — Part I explored how the (seemingly perpetual) explosion in data creation, data value, and IT complexity since the dawn of the digital age has come to shape our society. In particular, we note why these trends are responsible for our current IT predicament, namely, the rise in threats, risks, and regulations.

Making Sense of the SEC's New Rules for Cybersecurity Risk and Disclosure (Part I)

As the digital age unfolds, we continue to see seismic increases — decade-to-decade, year-to-year, and even month-to-month — in the amount of data we create as well as its value to us, both individually and collectively. From medical records, financial statements, and classified government documents to transactional processing systems, customer information, social media engagements, pictures of our pets, and so much more, data is the lifeblood of modern society.

11:11 Systems Secures 2023 Zero Trust Security Excellence Award

The Roman philosopher Seneca once said, “Luck is what happens when preparation meets opportunity.” In Vegas, when you are on a roll, you are on a roll. To beat the odds, you must be smart and disciplined. Whether winning big at the tables or championships on the basketball court, there is no better feeling. Often athletes are asked what it means to win and they often don’t have the words to describe it. Winning, regardless of the endeavor, almost always is a team effort.

Did you leave your front door open? Why cyberattacks surge using valid credentials

Have you ever been locked out of the house? Maybe you forgot your keys on the kitchen table, lost them running errands, or unknowingly dropped them while attempting the It doesn’t matter how you got locked out, or how you got back in. What’s more important, for the purposes of this thought exercise, at least, is how you responded.

How to navigate changes to VMware licensing.

Humans don’t like change. Whether it’s saying goodbye to your favorite pair of jeans, moving to a new house, or trying a new kind of coffee, we often resist change. But sometimes change is forced on us. For example: Over the past month or so, Broadcom rolled out tremendous changes to VMware licensing. This is why many of our customers and partners are wondering what the changes will mean to them.