Blog for


popular topics:

network security cloud security SASE Cloud Adoption reporting zero-trust GDPR compliance virtual desktop infrastructure (VDI) backhaul secure Internet internet access speed web proxy appliances cloud connector network perimeter agent Zero Trust Network Access plan Ransomware packet capture CASB on-prem MDM Cyber Threats Security Information and Event Management (SIEM) Kayesa Redirect Microsoft Cloud App Security (MCAS) YouTube Switching to iboss Gartner Security and Risk Summit SD-WAN Threat Landscape REvil executive order reverse proxy cyber hygiene Wessex Water DLP Microsoft Virtual Hubs conditions Cybersecurity Awareness Month IPSec UX Reports SIEM Network Behavior FireEye Cloud count Android ATARC log tuning admin console scheduling reports throttle video block Dropbox shadow IT Knowledge base block pages Rapid deployment Data Loss Prevention VirtualHubs Google Classroom cybersecurity awareness GRE Next Generation User Interface Microsoft 365 logs Cyber Trends Colonial Pipeline Data security crisis management PAC script Always-on VPN Cybersecurity Block YouTube HD objects next-gen cloud admin console API CASB dashboard UI block OneDrive Apache Log4j GeoZone country EA Sports cloud-based web security Cloud App Isolation Internet Security risk dashboard Chromebook Be Cyber Smart dedicated IP Faster page loads Microsoft partnership event viewer TTPs cloud-hosted JBS Remote device security Apple TLS Restricted Mode Lockdown mode civil cyber fraud Microsoft Azure primitives Remote Browser Isolation GUI block Log4Shell 9.8.27 block Data Breach security layers Exact Data Match Azure Secured Virtual Hubs cloud connected ChromeOS FedRAMP WCCP Instant Search iOS timeframe hackers ISO standards Healthcare NIST Apple SSL Allow List vulnerabilities Secured Virtual Hubs rules Safari RBI user interface block Google Drive malware file uploads migration to the cloud Defenders iboss platform version inventory keyword filter Tunneling Autosuggestion iPad callout HIMSS Cloud Access Security Broker Knowledgebase override
May 5, 2022
Zero Trust and Resource Protection: Verifying Every Resource Access with iboss Zero Trust Policy Manager
Today’s CIO faces a multitude of critical business concerns. To that end, Foundry, an IDG Company, released...
March 24, 2022
What to Know About the Okta Breach
We recently learned about a breach that impacted Okta. Although the breach was through a third-party outsourcing...
March 2, 2022
How Companies can Embrace Zero Trust and Reduce their Attack Surface
According to a January 2022 Forbes article, external threat actors can penetrate 93 percent of company networks....
February 9, 2022
The 2022 Cybersecurity Threat Landscape: What’s Next?
The threat landscape is always evolving. As today's modern workforce continues to work from 'anywhere,' threat actors...
cloud security zero-trust Threat Landscape Cyber Threats hackers
January 20, 2022
K-12 Cybersecurity Insights from Richard Quinones, Senior Vice President, Public Sector, iboss
Cybersecurity threats to K-12 schools and districts have increased significantly and continue to be an important concern...
December 16, 2021
What to know about Apache Log4j (Log4Shell)
iboss has completed a comprehensive review of the situation, risk to the iboss platform, and source code....
network security zero-trust plan cyber hygiene Apache Log4j Log4Shell