‘Tis the Season for Predictions – Part One
Josh Mayfield
‘Tis the Season for Predictions – Part One

As people in the U.S. get ready to over-eat their Thanksgiving Day feasts, cheer on their favorite football team and hopefully look back in gratitude on all the good things 2018 has brought them, it’s my habit to also consider what the year ahead may bring. In addition to my favorite team winning the Super Bowl, I also think the security industry is in for a few changes. Here...

READ MORE
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control
Kim Ellery
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control

Solid-state drives (SSD) have long been great tools because they automatically encrypt data stored on them and when the device is disconnected from its host device, the data on the SSD becomes unreadable. Additionally, hardware-based encryption uses fewer systems resources than software-based encryption so they were a perfect solution for data storage, or so we thought. Earlier this month, it was reported that researchers from Netherlands’ Radboud University published...

READ MORE
How to Track Your Devices, Apps & Data in 3 Steps
Josh Mayfield
How to Track Your Devices, Apps & Data in 3 Steps

Remember when your devices were relatively few, static and accessed data on the network only through a firewall? Barely, right? Those good old days are forever gone as the number of corporate endpoints have multiplied, are sourced from several manufacturers and come with different operating systems. Not to mention users now also access corporate networks from their own devices through applications that are too numerous to count. Likewise, security...

READ MORE