Location- and Device-agnostic Security for the Mobile Workforce

Location- and Device-agnostic Security for the Mobile Workforce

I've spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I'm also old enough to remember ...
SolarWinds Hack and the Case of DNS Security

SolarWinds Hack and the Case of DNS Security

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't ...
Tale of the Tape: Top 5 Reasons Phishing Attacks Haven't Dried Up

Tale of the Tape: Top 5 Reasons Phishing Attacks Haven’t Dried Up

One of my favourite websites is archive.org (OK, so I'm a nerd). For anyone not familiar with this website, it's essentially a time machine that allows you to go back and look ...
The-Nigerian-Scam-2.png

This Isn’t the Phishing Your First Boss Knew

| | Enterprise Threat Protector, etp
Phishing has been around for nearly as long as email has, and the perception that phishing tactics have not evolved persists. Many people believe we are still in the era of the ...
DNS Protection: A "Must" in Security Solutions for any Company

DNS Protection: A "Must" in Security Solutions for any Company

DNS is a critical element for all companies because it turns domain names into internet protocol (IP) addresses. Cyber criminals have been digging into DNS in order to create new threats. DNS ...
Securing Your Direct Internet Access Connections

Securing Your Direct Internet Access Connections

But now, with more traffic destined for SaaS applications and the public web, enterprises are increasingly adopting the Internet as the corporate network. Instead of sending SaaS or web traffic over the ...
U.S. Mid-term Elections and Akamai Enterprise Threat Protector

U.S. Mid-term Elections and Akamai Enterprise Threat Protector

The last few years have witnessed seismic changes in the world's political landscape and the way elections have been conducted. As of yet, there's no conclusive evidence that the results and outcomes ...
Your Users Have Left the Building: Now What?

Your Users Have Left the Building: Now What?

The dramatic growth of mobile devices, the widespread availability of always-on fast wireless networks, and the rapid adoption of cloud applications have transformed the viability of remote working. Employers are increasingly adopting ...