When it comes to achieving zero trust network access (ZTNA), there are many different architectures to choose from for your business’s solution. Today, we’ll discuss several in more detail to help you make the most informed choice possible.
July 25, 2023Read More
Do you have an old smartphone lying around? Don't recycle it or trade it in for a new one for a paltry sum! You can turn it into an Internet Protocol streaming security camera (IP camera) and view the live video stream from anywhere for free. You may get more value from repurposing your smartphone as a security camera than the trade-in value of your old phone. This blog post provides a step-by-step guide to upcycling your old phone.
May 2, 2023Read More
Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022Read More
Intrusion Detection Systems and Intrusion Prevention Systems — or IDS/IPS — are invaluable, readily available network security tools for mitigating malicious traffic and suspicious activity. And the benefits of IDS/IPS aren’t limited to vulnerabilities associated with 5G. Read on for a look at how your business can make an Intrusion Detection System and Intrusion Prevention System part of your security management.
February 22, 2022Read More
ast month, Google introduced “Supply chain Levels for Software Artifacts” (SLSA), an end-to-end framework to ensure the integrity of software artifacts throughout the software supply chain. It's a powerful first step -- but is it enough?
July 15, 2021Read More
The cyberattack that knocked an essential U.S. gasoline pipeline offline shows how dangerous the professional-scale hack-for-ransom threat is, and it's spreading rapidly.
May 13, 2021Read More
When the worst case scenario nearly played out in Oldsmar, Florida earlier this month, the cybersecurity community was perhaps less surprised than the public and mainstream media.
March 4, 2021Read More