Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
It was recently reported that Hollywood Presbyterian Medical Center paid a ransom to hackers to regain control of their computer systems. Although the amount...
Advanced Threat Prevention
27 Jan 2016

2016 is Here - Are You Set Up for Real Security?

2015 may just go down in history as the year of the hack. 2015 was filled with 365 days of headlines covering everything from the OPM breach, to Anonymous'...
In order to protect highly sensitive data and networks, such as military networks and critical infrastructure control systems, the most commonly used security...
Technology Partnerships
22 Jan 2016

Video: Getting Started with Metascan and Proxy SG

Detecting and preventing advanced threats from entering your organization's network requires scanning network traffic. By establishing a proxy server and...
Every organization has data flowing into and out of the organization. Along with any data comes the risk of malware. To protect against threats, most companies...
Research conducted by OPSWAT, provider of solutions to secure and manage IT infrastructure, found that over 80% of IT security professionals cite their biggest...
Kiosk & USB Security
21 Dec 2015

USB Security: Three Ways to Address USB Risks

Although USB flash drives are extremely useful devices for transferring data, they do come with security risks. Employees using USB drives at home and then...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.