Blog for


popular topics:

network security cloud security SASE Cloud Adoption reporting zero-trust secure Internet backhaul internet access speed GDPR compliance virtual desktop infrastructure (VDI) plan agent Zero Trust Network Access Ransomware packet capture on-prem web proxy appliances cloud connector network perimeter YouTube subscription Switching to iboss executive order CASB cyber hygiene SD-WAN REvil MDM Security Information and Event Management (SIEM) Kayesa Redirect Microsoft Cloud App Security (MCAS) Data security PAC script Colonial Pipeline Always-on VPN civil cyber fraud Block YouTube HD objects next-gen cloud admin console Remote Browser Isolation dashboard UI block OneDrive Apache Log4j GeoZone country cloud-based web security Exact Data Match Internet Security risk dashboard EA Sports FedRAMP dedicated IP Faster page loads Chromebook Microsoft partnership event viewer cloud-hosted Remote device security NIST Apple TLS Restricted Mode JBS Lockdown mode vulnerabilities Microsoft Azure primitives RBI GUI block Log4Shell 9.8.27 block security layers Defenders Azure Secured Virtual Hubs cloud connected Data Breach ChromeOS WCCP Instant Search timeframe ISO standards iOS Apple SSL Allow List Healthcare DLP Secured Virtual Hubs rules Cybersecurity Awareness Month user interface Safari block Google Drive Threat Landscape malware file uploads migration to the cloud Network Behavior iboss platform version inventory keyword filter ATARC Tunneling Autosuggestion reverse proxy callout iPad Cloud Access Security Broker ZTNA Knowledgebase override HIMSS Wessex Water Data Loss Prevention Microsoft Virtual Hubs conditions cybersecurity awareness IPSec UX Reports Cyber Threats SIEM crisis management FireEye Cloud count Android Cybersecurity log tuning admin console API CASB scheduling reports throttle video block Dropbox Containerization Knowledge base block pages Rapid deployment Cloud App Isolation VirtualHubs Be Cyber Smart GRE Next Generation User Interface Google Classroom Microsoft 365 logs hackers
May 26, 2022
U.S. School Districts Now Number One Target of Cyber Attacks
  Schools Face 50x More Attacks Than Financial Institutions According to Microsoft Security Intelligence, from April 15 through May...
May 5, 2022
Zero Trust and Resource Protection: Verifying Every Resource Access with iboss Zero Trust Policy Manager
Today’s CIO faces a multitude of critical business concerns. To that end, Foundry, an IDG Company, released...
March 24, 2022
What to Know About the Okta Breach
We recently learned about a breach that impacted Okta. Although the breach was through a third-party outsourcing...
March 2, 2022
How Companies can Embrace Zero Trust and Reduce their Attack Surface
According to a January 2022 Forbes article, external threat actors can penetrate 93 percent of company networks....
February 9, 2022
The 2022 Cybersecurity Threat Landscape: What’s Next?
The threat landscape is always evolving. As today's modern workforce continues to work from 'anywhere,' threat actors...
cloud security zero-trust Threat Landscape Cyber Threats hackers
December 16, 2021
What to know about Apache Log4j (Log4Shell)
iboss has completed a comprehensive review of the situation, risk to the iboss platform, and source code....
Apache Log4j Log4Shell network security zero-trust plan cyber hygiene