Welcome to Our Blog

In-depth security analysis, news, and advice

Jun 30


When it Comes to IoT, Risk Managers Want to Come to the (Third-) Party

In the Cybersecurity market, we have noticed that there isn’t a much discussion of the risks when third-parties deploy IoT devices in the enterprise. We turned to the findings of a recent Ponemon...

Jun 22


Embracing Change at the Summit

We just returned from the 2017 Gartner Security & Risk Management Summit, held in National Harbor, MD. It’s a great conference and this year there was plenty of new research and insights. They...

Jun 14


When NAC Deployment Projects Fail

Deploying a network access control (NAC) solution is one approach to reduce your risk of a network breach. At the same time, it’s accepted wisdom that not all NAC projects are successful. A scrapped...

Jun 08


IT vs. OT in IoT - Connecting the Shop Floor with the Top Floor

IoT and Industry 4.0 are radically changing the way manufacturers are doing business. There is a trend towards optimizing the manufacturing process through automation, IoT and IT. The real time...

Jun 01


Is Your Enterprise Facing an IoT Invasion?

Our recent on-demand webinar with John Pescatore, SANS Emerging Security Trends Director and Ty Powers, Great Bay Software Technical Product Manager, outlines an actionable plan to shore up your IoT...

May 26


An IoTastic Show: IoT World 2017 Recap

IoT World 2017 wrapped late last week with over 10,000 attendees. The Great Bay Software team attended the show and was pleased to meet many of you at the show. If you weren’t lucky enough to attend...

May 09


8 Best Practices for IoT Data Security

The data streaming from connected devices can be revealing. A person’s physical location, the amount of fuel used by a car, the amount of medicine dispensed by an infusion pump, the images from a...

May 02


7 Key Considerations to Ensure the Security of Your IoT Devices

The Internet of Things (IoT) can bring operational efficiencies, new business insights and satisfy needs that we didn’t even know we had. But ensuring the success of an IoT deployment depends on...

Apr 25


Building a Security Framework for Enterprise IoT

  Connected devices and the Internet of Things (IoT) promise to help enterprises and industrial organizations become more innovative, productive and cost-effective. But it’s no secret that IoT...

Apr 19


3 Major Benefits of Micro Segmentation in Healthcare

Virtualization has driven a wave of micro segmentation deployment in the data center. This security technology helps break the data center into logical elements, isolating access and limiting lateral...

Subscribe to Blog Updates