cyber security strategies

Finding the Balance with Windows Local Administrator Rights

As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows…

1 year ago

How Hysolate Mitigates Windows 7 End-of-Life Issues

The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will…

1 year ago

3 Perspectives on Browser Isolation

Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors…

1 year ago

Application Sandboxing: 3 Perspectives To Consider

Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept:…

1 year ago

Network Isolation with Virtual Endpoints

Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing…

1 year ago

EPP: 3 Perspectives on Endpoint Security Strategies

When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it…

1 year ago

The Security Alerts Your Analysts Should Be Following

Security alerts help organizations quickly detect advanced cyber attacks. However, organizations are often bombarded with alerts from an array of…

3 years ago