Security Strategy

Enabling resilience, innovation and digital transformation.


Article

What Is a Secure Web Gateway (SWG) and How Does It Work?

A secure web gateway (SWG) protects your organization against malware and other threats while enabling communications and virtual collaboration anywhere.

Apr 13, 2026

Read the article

Article

Cybersecurity Employee Training Best Practices

The growth of cyber security employee training has followed the rise of cyber attacks. Learn how to ensure your employee security training is done right.

Apr 13, 2026

Read the article

Article

Preventing a Supply Chain Attack: How Suppliers Can Mitigate Their Risks

Supply chain attacks are common, as hackers target high value suppliers. Learn how Verizon can help suppliers build a cyber risk-management program.

Apr 13, 2026

Read the article

Article

Boost Enterprise Mobile Device Security with Corporate-Liable Device Model

Which is better for enterprise mobile device security—corporate-liable devices or Bring Your-Own Device (BYOD)?

Apr 07, 2026

Read the article

Article

What Is Network Security, and How Can It Keep Your Business Safe?

Your network sits at the heart of your business. But it's under attack. Here's why network security matters for SMBs and what best practice looks like.

Mar 18, 2026

Read the article

Article

Cybersecurity Resilience: Why All Business Internet Is Not Equal

Learn why optimizing cybersecurity resilience starts with selecting the right business internet provider.

Mar 18, 2026

Read the article

White Paper

Cybersecurity ransomware in education

Dec 17, 2025

Read the white paper

White Paper

5G Network Security for Enterprises & Public Sector

Explore the security comparison of 5G standalone (SA) with 4G LTE. Learn how Verizon’s 5G security aligns with NIST, CISA, and 3GPP frameworks, highlighting features like network slicing and enhanced device security.

Dec 11, 2025

Read the white paper

Article

How Simplifying Security Solutions Can Optimize Cyber Risk Management

Cybersecurity has become increasingly complex, jeopardizing cyber hygiene. Here's how to streamline your security solutions to better manage risk.

Nov 14, 2025

Read the article