Welcome to Our Blog

In-depth security analysis, news, and advice

Sep 23


How One Small Turtle Sped Up Project Funding Approval

I wanted to recap the very informative “WhatWorks” webinar we hosted with John Pescatore from the SANs Institute and Jeremy Taylor from the Air Academy Federal Credit Union (AAFCU). You can watch the...

Sep 20


Don’t Let Frankenstein Impact Your Healthcare Network Security

We were struck by this comment in a ICIT Brief: “Vulnerable legacy systems and devices that lack the ability to update and patch are Frankensteined into networks possessing newer technologies that...

Sep 15


Deploying a NAC Alternative Makes Good Business Sense

Here are four reasons why deploying a NAC alternative at your credit union makes sense:  1.  Maintaining an accurate inventory of IT assets The Center of Internet Security (CIS) publishes a set of...

Sep 13


It’s About Time. Now there’s an “M” in the Internet of Things (IoT)

Recently Tech News World, published an interesting series of articles about the Internet of Medical Things (IoMT).[1] The use of IoT applications and devices in hospitals and clinics is not new. That...

Sep 08


5 Reasons for Credit Unions to be Cautious of Traditional NAC Solutions

As the risk of Cybercrime is on the rise, I often hear from our credit union customers about their network security challenges. They need solutions that ensure their client information is safe and...

Sep 06


Why the Healthcare Industry is the Top Target for Data Breaches

There’s a big reason that healthcare organizations are a prime target for cyber criminals. Healthcare systems and hospitals can be a ‘one-stop shop’ for personal information. Along with client names,...

Aug 04


Beacon Suite 5.0 Strengthens IoT Connection Security

New Endpoint Enforcement Module Automates IoT Onboarding and Access Policy Enforcement Last week we launched the Beacon Suite 5.0 to help enterprises discover, onboard, monitor and enforce access...

Jun 02


The Energy Industry & Securing IoT Devices

Here are the key takeaways you need to know about security & risk management, IoT connection security, and how the energy industry is taking action against IoT device driven data breaches.   The...

May 10


Agent vs Agentless Endpoint Security

Exploits and infections utilizing endpoints have been a threat to enterprise networks for decades.  Most endpoint security tools have attempted to address the problem in three ways: Block it from...

Apr 28


On The Origin of Endpoints by Means of Natural Selection

If you haven’t figured out already, this title is an ode to the work of Charles Darwin. You may be asking yourself “self, what does Charles Darwin have to do with computer security?” – well don’t...

Subscribe to Blog Updates