Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly

Read more

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Channel your best Alex Trebek voice: According to TechTimes, 70 percent of employees report not truly understanding this topic, which

Read more

How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

Do laptops have a place in the modern workplace? With more than 57 percent of enterprise internet usage occurring over

Read more

The Forrester Wave: Unified Endpoint Management, Q4 2019 — The Next Phase of UEM Evolution

Last year, Forrester separated out unified endpoint management (UEM) into its own category in its research, defining UEM as “products

Read more

Clone or Swap? SIM Card Vulnerabilities to Reckon With

The most commonly used computer platform nowadays is no longer a desktop or a laptop — it’s a phone. According

Read more

Why Zero Trust Is Critical to a Productive Mobile Workforce

The concept of zero trust has been around since John Kindervag coined the term in 2010. Google’s internal implementation through

Read more

How Video Became a Dangerous Delivery Vehicle for Malware Attacks

Most employees have some awareness about malware attacks. Many probably know that you should never open an executable file from

Read more