Blog

May 5, 2022
Zero Trust and Resource Protection: Verifying Every Resource Access with iboss Zero Trust Policy Manager
Today’s CIO faces a multitude of critical business concerns. To that end, Foundry, an IDG Company, released...
March 24, 2022
What to Know About the Okta Breach
We recently learned about a breach that impacted Okta. Although the breach was through a third-party outsourcing...
March 2, 2022
How Companies can Embrace Zero Trust and Reduce their Attack Surface
According to a January 2022 Forbes article, external threat actors can penetrate 93 percent of company networks....
February 9, 2022
The 2022 Cybersecurity Threat Landscape: What’s Next?
The threat landscape is always evolving. As today's modern workforce continues to work from 'anywhere,' threat actors...
cloud security zero-trust Threat Landscape Cyber Threats hackers
January 28, 2022
A Zero Trust Framework Helps the Federal Government Modernize its Cybersecurity Approach
Never trust. Always verify. This is the basis for a zero trust framework. As the Federal government...
January 20, 2022
K-12 Cybersecurity Insights from Richard Quinones, Senior Vice President, Public Sector, iboss
Cybersecurity threats to K-12 schools and districts have increased significantly and continue to be an important concern...