Blog for
General
popular topics:
network security cloud security SASE Cloud Adoption reporting zero-trust GDPR compliance virtual desktop infrastructure (VDI) internet access speed network perimeter Ransomware secure Internet Zero Trust Network Access packet capture on-prem web proxy appliances plan subscription Kayesa REvil executive order cyber hygiene Security Information and Event Management (SIEM) Microsoft Cloud App Security (MCAS) Switching to iboss ATARC migration to the cloud Rapid deployment FedRAMP Be Cyber Smart cybersecurity awareness Cybersecurity Awareness Month RBI Remote Browser Isolation API CASB CASB reverse proxy cloud-based web security Microsoft partnership Microsoft 365 security layers SIEM Network Behavior hackers Cyber Threats Threat Landscape Log4Shell Apache Log4j NIST Wessex Water crisis management Cybersecurity Defenders Exact Data Match Cloud App Isolation Data Loss Prevention DLP vulnerabilities civil cyber fraud throttle video Autosuggestion Instant Search Faster page loads Next Generation User Interface UX user interface GUI UI admin console Apple TLS ISO standards cloud-hosted Apple SSL Knowledgebase malware 9.8.27 GeoZone Tunneling Data security Remote device security SD-WAN HIMSS Healthcare JBS Colonial Pipeline WCCP Knowledge base Data Breach EA Sports log tuning Block YouTube HD iboss platform version FireEye Cloud PAC script next-gen cloud admin consoleJune 17, 2022
iboss wraps up RSA Conference and Gartner Security & Risk Management Summit with industry initiatives, awards, and opportunities
Reflecting on iboss’ presence at RSA Conference 2022 and Gartner’s Security & Risk Management Summit last week,...
June 7, 2022
iboss proudly sponsors Coalition to Close the Cybersecurity Talent Gap campaign
With an estimated $6 trillion in damages in 2021, cyber threats continue to rise around the world....
May 26, 2022
U.S. School Districts Now Number One Target of Cyber Attacks
Schools Face 50x More Attacks Than Financial Institutions
According to Microsoft Security Intelligence, from April 15 through May...
May 5, 2022
Zero Trust and Resource Protection: Verifying Every Resource Access with iboss Zero Trust Policy Manager
Today’s CIO faces a multitude of critical business concerns. To that end, Foundry, an IDG Company, released...
March 24, 2022
What to Know About the Okta Breach
We recently learned about a breach that impacted Okta. Although the breach was through a third-party outsourcing...
March 2, 2022
How Companies can Embrace Zero Trust and Reduce their Attack Surface
According to a January 2022 Forbes article, external threat actors can penetrate 93 percent of company networks....