Welcome to Our Blog

In-depth security analysis, news, and advice

Oct 11

2016

IoT Truly is the “Internet of every Thing”

Without a doubt, we’re in the decade of the Internet of Things. The technology has gone well beyond being the latest “bright, shiny object”. While applications started to emerge as early as the...

Oct 06

2016

Great Bay Software Named Representative Vendor in Gartner’s Market Guide for IoT Security

Today we announced that we have been identified as a representative vendor in the Gartner "Market Guide for IoT Security" report in the Real-Time Visibility and Control category. “Three eclectic...

Oct 04

2016

The Rx for Mitigating Medjacking

In a previous blog we discussed the Medjacking phenomenon that is becoming prevalent in the healthcare industry. Let’s quickly review what medjacking is: Medjacking - the hijacking of biomedical...

Sep 29

2016

5 Reasons Small Banks Should be Cautious of Traditional NAC Systems

Financial institutions are continually under media and regulatory scrutiny as well as a source of public concern. Banking is subject to more security control audits than ever as industry...

Sep 27

2016

Medjacking – An Epidemic in Healthcare

In a previous blog post, we reviewed why healthcare is the top target for Cybercrime. In another, we talked about the pervasive use of IoMT (Internet of Medical Things) applications and the resulting...

Sep 23

2016

How One Small Turtle Sped Up Project Funding Approval

I wanted to recap the very informative “WhatWorks” webinar we hosted with John Pescatore from the SANs Institute and Jeremy Taylor from the Air Academy Federal Credit Union (AAFCU). You can watch the...

Sep 20

2016

Don’t Let Frankenstein Impact Your Healthcare Network Security

We were struck by this comment in a ICIT Brief: “Vulnerable legacy systems and devices that lack the ability to update and patch are Frankensteined into networks possessing newer technologies that...

Sep 15

2016

Deploying a NAC Alternative Makes Good Business Sense

Here are four reasons why deploying a NAC alternative at your credit union makes sense:  1.  Maintaining an accurate inventory of IT assets The Center of Internet Security (CIS) publishes a set of...

Sep 13

2016

It’s About Time. Now there’s an “M” in the Internet of Things (IoT)

Recently Tech News World, published an interesting series of articles about the Internet of Medical Things (IoMT).[1] The use of IoT applications and devices in hospitals and clinics is not new. That...

Sep 08

2016

5 Reasons for Credit Unions to be Cautious of Traditional NAC Solutions

As the risk of Cybercrime is on the rise, I often hear from our credit union customers about their network security challenges. They need solutions that ensure their client information is safe and...

Subscribe to Blog Updates