Endpoint
BYOD Trends and Endpoint Security — What’s best for your organization?
The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While ...
DuckDuckGo: Crazy Name, Growing Crazy-Fast
The privacy lovers at DuckDuckGo, Inc. are pleased to say the business is growing fast. Plus, Apple have graciously allowed iPhone users to set DDG’s browser as the default on iOS 14 ...
Patching in the Time of Remote Work
It’s imperative that employers implement a patch cadence, regardless of whether employees agree with it This may sound controversial, but unfortunately, my experience shows it to be true: When humans are prompted ...
Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace
We’re excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can ...
Security Is No Longer A Binary Decision
David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate given the complexities of today's IT environments ...
Security Is No Longer A Binary Decision
David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate given the complexities of today's IT environments ...
Black Hat Conference: Multi-Vector EDR, With Qualys
Black Hat USA went virtual this year, thanks to COVID-19. Nonetheless, as always it was chock full of compelling stuff. I had the honor of hosting a session during the weeklong event, ...
SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On
Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their ...
How Resilient is your Nonprofit to a Cyberattack?
Nonprofit organizations can range from local community centers to large-scale operations such as city wide food banks or museums. These organizations are intertwined with the fiber of a community and beyond, often ...
How Resilient is your Nonprofit to a Cyberattack?
Nonprofit organizations can range from local community centers to large-scale operations such as city wide food banks or museums. These organizations are intertwined with the fiber of a community and beyond, often ...
