2020 was challenging in many ways, from a rapid influx of remote working, the maturity of 5G computing, IoT/OT infrastructure, Edge and Cloud environments to the threats that come with them. According to AT&T Cybersecurity Insights™ Report...
The perimeter-less, cloud-based working environment was always inevitable, but most thought leaders scheduled this revolution for sometime around 2025. With the advent of remote work, and with the prospect that no one will quickly return...
The disruption COVID-19 has wrought on society presented many opportunities for people to display their best and worst qualities. I recently saw a video referencing a remark Amy Poehler made in her memoir, Yes Please that stuck with me....
Firewalls are the most recognized security tool for safeguarding your network and are a critical component of any security infrastructure. Firewalls are considered the gatekeeper for most network security architectures, allowing only...
Somedays, it feels like the whole internet is slowing down, or like the critical applications you use on a day-to-day basis aren’t responding. Sometimes, that feeling isn’t just you (or the result of your slow computer). Instead, it’s the...
Threat hunting is one of the few IT terms I've come across that probably sounds cool to people who aren't engineers. But cyber threat hunting is more than just an industry buzzword—or an edgy-sounding skill to add to your resume. It's...