AAC.png

Why Identity Aware Proxies are Key to Adaptive Access Controls

By now, you have likely heard the term "Zero Trust". From tech seminars and industry events to webinars and whitepapers, it is popping up everywhere. CISOs and CTOs are constantly inundated with calls and messages from different vendors proclaiming different ways their solutions can help them transition to this security ... Read More
malware.png

Protect Your Network From Malware

There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco ... Read More
Microsegmentation.png

Zero Trust and the Case for Application Microsegmentation

Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused ... Read More
Remote access in a software defined world

Remote access in a software defined world

When I first ventured into technology, I wish someone gave me a heads-up about the bevy of acronyms to remember. It feels like every day a new acronym related to technology is formed. It's hard enough remembering names within my ... Read More
How smart is my smart TV?

How smart is my smart TV?

| | Connected Devices
Some weeks ago, my friend asked me the headlining question while we were having a random argument about electronics. I found it to be an interesting one, particularly because it underlines the current mindset towards security of electronic devices communicable ... Read More