Welcome to Our Blog

In-depth security analysis, news, and advice

Sep 23

2016

How One Small Turtle Sped Up Project Funding Approval

I wanted to recap the very informative “WhatWorks” webinar we hosted with John Pescatore from the SANs Institute and Jeremy Taylor from the Air Academy Federal Credit Union (AAFCU). You can watch the...

Sep 20

2016

Don’t Let Frankenstein Impact Your Healthcare Network Security

We were struck by this comment in a ICIT Brief: “Vulnerable legacy systems and devices that lack the ability to update and patch are Frankensteined into networks possessing newer technologies that...

Sep 15

2016

Deploying a NAC Alternative Makes Good Business Sense

Here are four reasons why deploying a NAC alternative at your credit union makes sense:  1.  Maintaining an accurate inventory of IT assets The Center of Internet Security (CIS) publishes a set of...

Sep 13

2016

It’s About Time. Now there’s an “M” in the Internet of Things (IoT)

Recently Tech News World, published an interesting series of articles about the Internet of Medical Things (IoMT).[1] The use of IoT applications and devices in hospitals and clinics is not new. That...

Sep 08

2016

5 Reasons for Credit Unions to be Cautious of Traditional NAC Solutions

As the risk of Cybercrime is on the rise, I often hear from our credit union customers about their network security challenges. They need solutions that ensure their client information is safe and...

Sep 06

2016

Why the Healthcare Industry is the Top Target for Data Breaches

There’s a big reason that healthcare organizations are a prime target for cyber criminals. Healthcare systems and hospitals can be a ‘one-stop shop’ for personal information. Along with client names,...

Aug 04

2016

Beacon Suite 5.0 Strengthens IoT Connection Security

New Endpoint Enforcement Module Automates IoT Onboarding and Access Policy Enforcement Last week we launched the Beacon Suite 5.0 to help enterprises discover, onboard, monitor and enforce access...

Jun 02

2016

The Energy Industry & Securing IoT Devices

Here are the key takeaways you need to know about security & risk management, IoT connection security, and how the energy industry is taking action against IoT device driven data breaches.   The...

May 10

2016

Agent vs Agentless Endpoint Security

Exploits and infections utilizing endpoints have been a threat to enterprise networks for decades.  Most endpoint security tools have attempted to address the problem in three ways: Block it from...

Apr 28

2016

On The Origin of Endpoints by Means of Natural Selection

If you haven’t figured out already, this title is an ode to the work of Charles Darwin. You may be asking yourself “self, what does Charles Darwin have to do with computer security?” – well don’t...

Subscribe to Blog Updates