Most recent

MSSP vs MSP: What a Missing “S” Could Mean for Your Company

A missing “S” could cost your company dearly. Many otherwise-savvy business professionals don't know the difference between Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs).

Read More
02 Oct 2018

130 Million Hotel Customers Breached Due to Exposed Database

Over the last few months, there’s been another massive security breach, one that you potentially haven’t heard of. Its scale was nearly as large as that of Equifax, with 130 million consumers affected.

Read More
25 Sep 2018

How to Protect Your SMB Clients from Ransomware

No company is too small to be devastated by a ransomware attack. In fact, small and medium-sized businesses (SMBs) are prime targets, and the number--and cost--of such attacks continues to rise.

Read More
17 Sep 2018

How to Speed Up DevOps in 3 Steps

DevOps is at a difficult transition point. Once the sole domain of startups looking to “move fast and break things”, the DevOps philosophy is now being taken up by large incumbents and Fortune 500 companies – and failing.

Read More
12 Sep 2018

Anonymous Application Access: Get This Valuable Service Safely On Board

In an age where the cloud has made browser interactions the norm, companies are discovering the value of anonymous application access and client-less access.

Read More
09 Sep 2018

How’s It Going With the GDPR? Steps To Take To Protect Your Business This Fall

We’ve been talking about the levels of panic in U.S. boardrooms over the big, scary GDPR, which is now here and has been ruling data privacy with an iron fist all summer.

Read More
28 Aug 2018

Botnets: The Living Dead of The Malware World

Mirai. Reaper. Hajime. 

The biggest IoT botnet threats to the healthcare industry today.

Read More
16 Aug 2018

4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible.

Read More
08 Aug 2018

You Can’t Fix Authentication Without Fixing Access

Think of the last time you logged into your network. Let’s assume that you used a traditional VPN, with a traditional IAM scheme underneath. This isn’t a bad assumption, because 25% of all internet traffic goes over a VPN. 

Read More
26 Jul 2018


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!