BYOD Trends and Endpoint Security — What’s best for your organization?

The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While ...
DuckDuckGo

DuckDuckGo: Crazy Name, Growing Crazy-Fast

The privacy lovers at DuckDuckGo, Inc. are pleased to say the business is growing fast. Plus, Apple have graciously allowed iPhone users to set DDG’s browser as the default on iOS 14 ...
Security Boulevard
patching

Patching in the Time of Remote Work

It’s imperative that employers implement a patch cadence, regardless of whether employees agree with it This may sound controversial, but unfortunately, my experience shows it to be true: When humans are prompted ...
Security Boulevard
Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can ...

Security Is No Longer A Binary Decision

David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate given the complexities of today's IT environments ...

Security Is No Longer A Binary Decision

David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate given the complexities of today's IT environments ...
multi-vector EDR

Black Hat Conference: Multi-Vector EDR, With Qualys

Black Hat USA went virtual this year, thanks to COVID-19. Nonetheless, as always it was chock full of compelling stuff. I had the honor of hosting a session during the weeklong event, ...
Security Boulevard
SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their ...
How Resilient is your Nonprofit to a Cyberattack?

How Resilient is your Nonprofit to a Cyberattack?

Nonprofit organizations can range from local community centers to large-scale operations such as city wide food banks or museums. These organizations are intertwined with the fiber of a community and beyond, often ...
How Resilient is your Nonprofit to a Cyberattack?

How Resilient is your Nonprofit to a Cyberattack?

Nonprofit organizations can range from local community centers to large-scale operations such as city wide food banks or museums. These organizations are intertwined with the fiber of a community and beyond, often ...