by Garrett Bekker | Jan 5, 2023 | Blog, Improving Legacy Technology
The evolution of the cybersecurity market has been to a great extent driven by the “arms race” between attackers and security professionals. Each iterative advance by one group has typically been met by a counter-response from the other that attempts to circumvent or...
by Garrett Bekker | Jul 7, 2022 | Blog, Company News
There is a lot of “buzz” around zero trust these days, mostly for its ability to provide superior security outcomes. Done properly, a zero-trust framework can help reduce phishing and ransomware attacks, make it harder for attackers to move laterally and...
by Garrett Bekker | Nov 16, 2021 | Blog, How-To
In the wake of the COVID-19 pandemic, remote access has become a critical aspect of most organizations’ overall IT strategy. Before Covid hit, 451 Research survey data showed that just over a quarter of employees worked all or most of their time either from home or...
by Garrett Bekker | Apr 13, 2020 | Blog, Improving Legacy Technology
Deciphering NIST Guidelines to replace your legacy VPN and deliver secure remote access. The world of Secure Remote Access has changed It’s almost become a cliché to say that cloud computing is growing, and there are numerous stats available that confirm the rapid...
by Garrett Bekker | Oct 10, 2019 | Blog
For much of its short history, information security has been dominated by a perimeter-based network security model that essentially assumes that anyone inside the corporate network boundary was ‘trusted’ and anyone on the outside was ‘untrusted.’ This notion of trust...