Blog for

General

popular topics:

network security cloud security SASE Cloud Adoption reporting zero-trust GDPR compliance virtual desktop infrastructure (VDI) secure Internet backhaul internet access speed web proxy appliances cloud connector network perimeter agent Zero Trust Network Access plan Ransomware packet capture on-prem MDM Security Information and Event Management (SIEM) Kayesa Redirect Microsoft Cloud App Security (MCAS) YouTube Switching to iboss Gartner Security and Risk Summit CASB SD-WAN REvil executive order reverse proxy cyber hygiene DLP Microsoft Virtual Hubs conditions Wessex Water IPSec UX Cybersecurity Awareness Month Reports Threat Landscape Network Behavior FireEye Cloud count SIEM log tuning admin console Android ATARC scheduling reports throttle video ZTNA Knowledge base block pages block Dropbox Data Loss Prevention VirtualHubs Rapid deployment GRE Next Generation User Interface Google Classroom cybersecurity awareness logs Cyber Threats Microsoft 365 crisis management PAC script Colonial Pipeline Data security Block YouTube HD objects next-gen cloud admin console Always-on VPN Cybersecurity dashboard UI API CASB Containerization GeoZone country block OneDrive Cloud App Isolation Internet Security risk dashboard EA Sports cloud-based web security dedicated IP Faster page loads Chromebook Be Cyber Smart event viewer hackers cloud-hosted Microsoft partnership Apple TLS Restricted Mode JBS Remote device security civil cyber fraud Microsoft Azure primitives Lockdown mode GUI Remote Browser Isolation Apache Log4j 9.8.27 block block box.com Exact Data Match Azure Secured Virtual Hubs cloud connected Data Breach security layers WCCP Instant Search ChromeOS FedRAMP timeframe ISO standards iOS NIST Apple SSL Allow List Healthcare vulnerabilities Secured Virtual Hubs rules user interface Safari RBI Log4Shell malware file uploads block Google Drive Defenders iboss platform version inventory migration to the cloud Tunneling Autosuggestion keyword filter callout iPad Knowledgebase override HIMSS Cloud Access Security Broker
June 23, 2022
Zero Trust: The glue that holds everything together
A holistic approach to Zero Trust can provide a multitude of benefits, including preventing malware from entering...
June 17, 2022
iboss wraps up RSA Conference and Gartner Security & Risk Management Summit with industry initiatives, awards, and opportunities
Reflecting on iboss’ presence at RSA Conference 2022 and Gartner’s Security & Risk Management Summit last week,...
June 7, 2022
iboss proudly sponsors Coalition to Close the Cybersecurity Talent Gap campaign
With an estimated $6 trillion in damages in 2021, cyber threats continue to rise around the world....
May 26, 2022
U.S. School Districts Now Number One Target of Cyber Attacks
  Schools Face 50x More Attacks Than Financial Institutions According to Microsoft Security Intelligence, from April 15 through May...
May 5, 2022
Zero Trust and Resource Protection: Verifying Every Resource Access with iboss Zero Trust Policy Manager
Today’s CIO faces a multitude of critical business concerns. To that end, Foundry, an IDG Company, released...
March 24, 2022
What to Know About the Okta Breach
We recently learned about a breach that impacted Okta. Although the breach was through a third-party outsourcing...