Blog

Several recent events sparked an interesting conversation amongst the research team.  While our discussion left us with many questions and few answers, it is also a discussion that many of our readers should be seeking answers to in their own organizations – sooner rather than later, as the answers will be unique to each organization.…

Read more

In my role as a sales and business development consultant, I come in contact with sales professionals and business executives across numerous industries. I understand the trends involved with the integration of physical security, IT infrastructure and cyber solutions. The emergence of the Internet of Things (IoT), perhaps more appropriately described as the “Integration of…

Read more

What is crypto currency, how does it work, and how can we protect? Brief introduction: While there are multiple versions of Crypto Currency, BitCoin being the oldest and seemingly most popular, all versions of the currency work on similar principles.  Crypto Currency is not based on any physical object, while some may issue a physical…

Read more

As the Holiday season kicks off in the US, there are several predictable behaviors that can be considered when planning celebrations. If adult beverages are being served, someone WILL drink too much, so a responsible host can take keys or organize a safe ride home. Someone WILL leave their gift shopping to the last minute,…

Read more

This blog can originally found on blog.fortiumpartners.com By 2020, there will be 200 billion smart objects in the world, connecting everything from cars, planes and homes to medication, fitness devices and animals. Dependence on technology enriches our daily lives in countless ways, but what happens when technology fails? What happens when hackers and cybercriminals exploit vulnerabilities? The Economist…

Read more

While our hearts and minds are occupied with prayers and well wishes for the people of Texas, and our colleagues living and working in the area, we would also be remiss if we didn’t remind people of opportunists who will exploit this disaster for their own gain. In the past, after natural disasters, false charities…

Read more

It seems that what is proving so good for businesses, customers and users can sometimes hide many dragons. With all the value creation of digital business models – the connected ecosystems requires to conduct business instantly, bring more risk to the CISO. Cyber attacks are more frequent and more sophisticated with targets like smart phones,…

Read more

Without a trashed hotel room ever being reported to HR, skinny jeans worn to a client meeting, or providing free Quinoa-Fridays – we have achieved something ‘cool’ as a business this week. Each year, the largest analyst firm on the planet, Gartner, identifies new Cool Vendors considered innovative or transformative in key technology areas and…

Read more

Threat intelligence . . .  or as we like to call it, AED. AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the…

Read more

Originally posted at ITWatchIT.com IoT Devices and Mobile Security IoT is a very scary environment, and we have only seen the tip of the iceberg. We operate in the area of secure communications and we operate IPsec for the reason that people can’t break it, as opposed to SSL/TLS, where people can do man-in-the-middle attacks. If…

Read more

Enter your details and we’ll get back to you