Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
Kiosk & USB Security
21 Dec 2015

USB Security: Three Ways to Address USB Risks

Although USB flash drives are extremely useful devices for transferring data, they do come with security risks. Employees using USB drives at home and then...
Would you like to increase your malware threat protection on Symantec Secure Web Gateway and downloads? Metascan can be used with ProxySG to significantly...
Data Sanitization
12 Nov 2015

Video: NIAS Data Sanitization Presentation

The NATO information assurance symposium (NIAS) is the NCI Agency's annual cyber security event for NATO organizations and industry partners. This year,...
Maintaining endpoint visibility with or without client agents is fundamental to any network or information security architecture. Regardless of processes,...
Last month, we attended the NIAS Cyber Security Symposium in Mons, Belgium with our partners from Arbit Security. Arbit, providers of a one-way data diode,...
Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security...
After discussing content disarm and reconstruction (CDR) in general in part one of this series and file structure alterations in part two, I am now ready to...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.