Security

BlackBerry BRIDGE Microsoft Intune

The BlackBerry Enterprise BRIDGE: The Most Important Product You’ve Never Heard Of

We don’t take security seriously enough—particularly with regard to our personal device use. The communications we have with these devices can be work-related, finance-related, medical in nature or legal in nature, and involve people like our kids or parents who

The BlackBerry Enterprise BRIDGE: The Most Important Product You’ve Never Heard Of Read More »

risk management iso 27001

Less Pain, More Gain: A Better Way to Work Toward Improved Information Security Risk Management and ISO 27001 Compliance

How have the recent privacy and security violations crowding the daily newsfeeds changed your company’s behavior? There’s a silver lining to all the doomsday headlines — they should compel stakeholders in your company to pay more attention and provide more

Less Pain, More Gain: A Better Way to Work Toward Improved Information Security Risk Management and ISO 27001 Compliance Read More »

Oracle Java deserialization

Will Dropping Serialization from Java Remove the Vulnerabilities?

During “Ask The Architect” at the Devoxx UK 2018 conference, Oracle’s chief architect, Mark Reinhold, called Java’s serialization mechanism a “horrible mistake” and a virtually endless source of security vulnerabilities. More importantly, Reinhold announced Oracle’s decision to improve Java’s security

Will Dropping Serialization from Java Remove the Vulnerabilities? Read More »

IoT attacks IoT security

This Isn’t a Tech Thriller: IoT Attacks Are Real

If you read enough tech thriller or science fiction books, you’re bound to be familiar with a super villain using some kind of technology to wreak havoc across the planet—often triggered by hacking critical internet-of-things (IoT) systems. But the fact

This Isn’t a Tech Thriller: IoT Attacks Are Real Read More »

cybersecurity insider threat

The Greatest Cybersecurity Threats are Inside Your Own Walls

Most companies have invested significantly in technology to protect their systems and data from hackers. But what’s often overlooked in cybersecurity—the human element—is just as dangerous, if not more dangerous. IBM reported in 2014 that human error is a contributing

The Greatest Cybersecurity Threats are Inside Your Own Walls Read More »

zero trust next-gen access

The Zero Trust Model Provides a More Proactive Approach to Security

Companies are under siege from a virtually endless onslaught of malware attacks, exploits, and other attempts to compromise servers, applications or data—and most are not doing very well at defending against it. A scan of news headlines from the past

The Zero Trust Model Provides a More Proactive Approach to Security Read More »

Scroll to Top