You might not be able to see it, but it’s here. Lingering in the virtual cyber sphere lay containerized packets of information from sensitive data to music and photos. More and more organizations are migrating to the cloud if they haven’t done so already. The pandemic...
Game Face On: Getting Serious About Data Breaches
An August T-Mobile data breach affecting more than 53 million people including current, former and prospective customers is one of many recent cyber attacks to flood headlines. The breach led to two class action lawsuits filed by customers and accuses the company of...
Four Tools & Tips to Properly Secure Your Network
A recent report issued by a U.S. Senate Committee revealed that America’s data is in fact still at risk. Cybersecurity at eight federal agencies was found to be so poor that four of them earned grades of D, three got Cs, and only one received a B. The report also...
Aruba’s New Edge and Tomorrow’s Network Minions
At Aruba's virtual Atmosphere event recently, they announced a vision around the network having a 'sixth sense'. Throughout the virtual sessions and demos one thing became obvious - Aruba is finally executing on its strategy to pull its portfolio in to a tighter weave...
3 Tips for Keeping Your Enterprise Safe in the Era of IoT
Do you ever stop to think about the rate at which the technology around us is evolving? Most people don’t. Technology is so ingrained into our everyday lives that the rapid digital transformation across entire industries goes unnoticed. Perhaps the most destructive,...
Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks
Forceful revenge said to follow in response to a recent U.S. airstrike, resulting in the death of Iran’s top general Qassem Soleimani, is predicted to disrupt our lives in unprecedented ways. The cybersecurity threats facing the U.S. range from widespread economic and...
How Smart is IoT Device Security? Continuous inventory, monitoring, and security for enterprise IoT
Consumers have fallen in love with smart devices and effortless connectivity. If you own devices like Amazon Alexa or Google Assistant, chances are you’ve fallen down the IoT rabbit hole. IoT-enabled devices allow both technical and non-technical consumers of...
2020 Cybersecurity Predictions
Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...