2014

Encryption · Industry Commentary · VPN

Ransomware Looks to Blackmail Enterprises

When most people think of threats to their computer systems and networks, the usual suspects come to mind — malware and keystroke loggers that are meant to steal passwords to remotely access corporate...

Industry Commentary · Shows · VPN

RSA 2014: Three Key Remote Access Takeaways

This year, with cryptography and information security becoming higher profile than ever before, more than 25,000 attendees made the trip to San Francisco for RSA Conference, which was filled to the...

2 Factor Authentication · Endpoint Management · Industry Commentary

The Target Breach: How Network Security Best Practices Could Have Prevented It

Who would have thought that an HVAC system could lead to the data of millions of people being compromised? Target surely didn’t. Recently, it has come to light that the Target breach hackers likely...

Encryption · Industry Commentary · IT policy · VPN

Why Enterprises Are Struggling So Much with Encryption

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A...

Encryption · Industry Commentary · Mobile · VPN

A Closer Look at the Android VPN Flaw

It’s been a rough couple of years for Android devices. Sure, there may have been more than 900 million of them activated in 2013 alone, but those impressive sales numbers do nothing to inhibit cyber...

Encryption · IT policy · VPN

Stopping Remote Access Breaches with “Honey”

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit...

Industry Commentary · IT policy · Mobile · VPN

The Workplace of the Future and What It Means for Network Security

The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working...

Encryption · Industry Commentary · VPN

Target and Neiman Marcus Hacks: The Network Security Lesson to Learn

Even if you’re not one of the tens of millions of customers that have had your credit card data stolen and sold on the black market, you’ve almost certainly heard about the Target hack that occurred...

Cloud · Industry Commentary · Rethink Remote Access · VPN

The Internet of Vulnerable Things: Why Remote Access Security is Critical

A new worm that targets embedded devices started to spread during the holiday season. The Zollard worm, which targets various devices running on Linux, has brought to light the numerous security...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK