Blog for


popular topics:

network security cloud security SASE reporting Cloud Adoption zero-trust virtual desktop infrastructure (VDI) backhaul secure Internet internet access speed GDPR compliance cloud connector network perimeter plan agent Zero Trust Network Access Ransomware packet capture on-prem web proxy appliances Redirect Microsoft Cloud App Security (MCAS) YouTube Switching to iboss executive order CASB cyber hygiene SD-WAN REvil MDM Security Information and Event Management (SIEM) Kayesa admin console Android Cybersecurity log tuning throttle video API CASB scheduling reports block pages block Dropbox Containerization Knowledge base Rapid deployment Cloud App Isolation VirtualHubs Next Generation User Interface Google Classroom Be Cyber Smart GRE Microsoft 365 logs hackers Colonial Pipeline Data security PAC script next-gen cloud admin console Always-on VPN civil cyber fraud Block YouTube HD objects UI Remote Browser Isolation dashboard country block OneDrive Apache Log4j GeoZone risk dashboard EA Sports cloud-based web security Exact Data Match Internet Security Faster page loads Chromebook FedRAMP dedicated IP Microsoft partnership event viewer subscription cloud-hosted Restricted Mode JBS Remote device security NIST Apple TLS Lockdown mode vulnerabilities Microsoft Azure primitives GUI RBI block block Log4Shell 9.8.27 cloud connected Data Breach security layers Defenders Azure Secured Virtual Hubs Instant Search ChromeOS WCCP ISO standards iOS timeframe Allow List Healthcare Apple SSL DLP Secured Virtual Hubs rules user interface Safari Cybersecurity Awareness Month file uploads block Google Drive Threat Landscape malware inventory migration to the cloud Network Behavior iboss platform version Autosuggestion keyword filter ATARC Tunneling iPad reverse proxy callout override HIMSS Cloud Access Security Broker ZTNA Knowledgebase Wessex Water Data Loss Prevention Microsoft Virtual Hubs conditions UX cybersecurity awareness IPSec Reports Cyber Threats count SIEM crisis management FireEye Cloud
February 27, 2023
CISA Urges Increased Vigilance One Year After Russia’s Invasion of Ukraine
In response to the CISA alert urging increased vigilance one year after Russia’s invasion of Ukraine, organizations...
January 23, 2023
Browser Isolation: The Zero Trust VDI Replacement
Accessing customer data is an essential part of the customer service experience. However, when Call Center agents...
June 23, 2022
Zero Trust: The glue that holds everything together
A holistic approach to Zero Trust can provide a multitude of benefits, including preventing malware from entering...
June 17, 2022
iboss wraps up RSA Conference and Gartner Security & Risk Management Summit with industry initiatives, awards, and opportunities
Reflecting on iboss’ presence at RSA Conference 2022 and Gartner’s Security & Risk Management Summit last week,...
June 7, 2022
iboss proudly sponsors Coalition to Close the Cybersecurity Talent Gap campaign
With an estimated $6 trillion in damages in 2021, cyber threats continue to rise around the world....
May 26, 2022
U.S. School Districts Now Number One Target of Cyber Attacks
  Schools Face 50x More Attacks Than Financial Institutions According to Microsoft Security Intelligence, from April 15 through May...