The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. Because IT staff and resources are often sparse within mid-sized businesses, they see the public clo...
Read more

DevSecOps Begins at the Application Layer

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security...
Read more

Mid-sized Healthcare Organizations Need Enterprise-sized Security

Mid-sized healthcare facilities are facing serious network threats. For instance, an Osterman Research report revealed that the healthcare industry is exceptionally vulnerable to ransomware. The repor...
Read more

Marriott—the 500M Record Scandal Marring the Hospitality Industry

I have been a customer of Marriott for over 25 years. With some exceptions, the Marriott chain has been able to hold onto my loyalty with their service better than banks, credit card issuers, airlines...
Read more

Why Mid-Size Businesses Must Have Enterprise-Grade Security

Just because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity. The percentage of mid-market businesses that have experienced a cyber-attack is up fro...
Read more

An In-Depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

The FIDO Alliance is a non-profit group that was founded in 2012 with the goal of eliminating passwords from the internet through the use of cryptographic protocols. To learn more about the Alliance, ...
Read more

FIDO 101: Understanding FIDO Strong Authentication and What It Can Do for You

If you'd like to dive deeper into the world of FIDO, we recommend reading our FIDO 201 article, and our in-depth guide to FIDO Protocols. What Is FIDO? FIDO is an acronym for “Fast Identity Online.” T...
Read more

ACT Quickly to Ensure the Safety of Your Data

Keeping a financial services organization’s data safe can seem like mission impossible, but focusing on the application layer will eliminate the vast majority of data breach risks. Within this layer, ...
Read more