Blog

Without a trashed hotel room ever being reported to HR, skinny jeans worn to a client meeting, or providing free Quinoa-Fridays – we have achieved something ‘cool’ as a business this week. Each year, the largest analyst firm on the planet, Gartner, identifies new Cool Vendors considered innovative or transformative in key technology areas and…

Read more

Threat intelligence . . .  or as we like to call it, AED. AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack, in the shortest possible time, and with the highest…

Read more

Originally posted at ITWatchIT.com IoT Devices and Mobile Security IoT is a very scary environment, and we have only seen the tip of the iceberg. We operate in the area of secure communications and we operate IPsec for the reason that people can’t break it, as opposed to SSL/TLS, where people can do man-in-the-middle attacks. If…

Read more

Originally published at CMO.com on May 17, 2017 From Amazon’s robotic vacuum to robot toys that teach coding, there are now 6.4 billion web-enabled objects (and counting) streamlining even the smallest of everyday activities. For marketers, the Internet of Things (IoT) offers huge potential—of the 62% U.S. adults owning at least one connected device, half of…

Read more

We recently read this article from CNN Tech, titled “Please stop charging your phone in public ports”, and had a few follow up questions for our Head of Applied Research, Sam Stover and Lead Developer, Michael Jarvis. This warning is not a brand new revelation and researchers at Kaspersky Labs found in May 2016 that they could install a third-party application,…

Read more

We live in a global network of connected people. Each and every day we log in or reach out to various sources, across a variety of devices to drive our lives forward. This behavior is redefining the network perimeter as ‘edgeless’, creating a massive security conundrum for businesses attempting to embrace the mobile workforce. BYOD…

Read more

During RSA 2017, we decided to break the train of expos and speakers to pair a relevant industry topic with wine and scotch tasting. Hedonistic, we know. Attribution. We hear the topic brought up constantly, may even refer to it ourselves on a daily basis, and yet how many of us have identified a strategy…

Read more

In regards to US cybersecurity, what should Trump focus on as he kicks off his 100-day plan? Characterizing his agenda as “putting America first,” the President-elect said that cyber-attacks from foreign governments and non-state terrorist actors is “one of our most critical national security concerns.” Details were few, but the Republican pledged to create a…

Read more

Is the Tesco Bank hack the wakeup call needed to make mobile security a priority? The recent Tesco Bank hack has left the retail banking world reeling, searching for answers and more effective ways to secure networks against future attacks. It has been revealed weaknesses in the bank’s mobile applications left the door open for…

Read more

Enter your details and we’ll get back to you