Blog for

General

popular topics:

network security cloud security SASE reporting Cloud Adoption zero-trust backhaul secure Internet GDPR compliance virtual desktop infrastructure (VDI) internet access speed cloud connector agent Ransomware network perimeter Zero Trust Network Access packet capture on-prem web proxy appliances plan Redirect YouTube Security Information and Event Management (SIEM) Microsoft Cloud App Security (MCAS) Switching to iboss MDM CASB SD-WAN REvil Kayesa executive order cyber hygiene subscription objects primitives rules conditions risk dashboard cloud connected inventory count Restricted Mode Allow List override block pages country block file uploads iOS iPad Safari Google Classroom Chromebook ChromeOS keyword filter Android Always-on VPN Lockdown mode Wessex Water Rapid deployment cloud-based web security security layers migration to the cloud SIEM Data security Remote device security Cloud Access Security Broker block Dropbox block OneDrive block box.com block Google Drive Reports logs event viewer timeframe callout scheduling reports dashboard IPSec GRE dedicated IP WCCP Tunneling log tuning Block YouTube HD Microsoft Azure Secured Virtual Hubs Microsoft Virtual Hubs VirtualHubs Internet Security Azure Secured Virtual Hubs iboss platform version FireEye Cloud PAC script Apple TLS Apple SSL Knowledgebase Knowledge base GeoZone 9.8.27 malware cloud-hosted ISO standards throttle video UI GUI user interface UX Next Generation User Interface Faster page loads Instant Search Autosuggestion admin console next-gen cloud admin console EA Sports Data Breach Colonial Pipeline JBS Healthcare HIMSS Microsoft 365 Microsoft partnership reverse proxy API CASB Remote Browser Isolation RBI Cybersecurity Awareness Month cybersecurity awareness Be Cyber Smart FedRAMP ATARC Cybersecurity civil cyber fraud vulnerabilities DLP Data Loss Prevention Cloud App Isolation Exact Data Match Defenders Network Behavior crisis management NIST ZTNA Containerization Apache Log4j Log4Shell Threat Landscape Cyber Threats hackers
February 9, 2022
The 2022 Cybersecurity Threat Landscape: What’s Next?
The threat landscape is always evolving. As today's modern workforce continues to work from 'anywhere,' threat actors...
cloud security zero-trust Threat Landscape Cyber Threats hackers
iboss-careers-CTA-bw
December 16, 2021
What to know about Apache Log4j (Log4Shell)
iboss has completed a comprehensive review of the situation, risk to the iboss platform, and source code....
network security zero-trust plan cyber hygiene Apache Log4j Log4Shell
December 10, 2021
For Government Agencies: Improved Cyber Hygiene will Help, but without Change the Problem will Remain
Improved cyber hygiene is critical to protect against malicious adversaries seeking to infiltrate Government systems and compromise...
network security zero-trust plan NIST cyber hygiene
December 2, 2021
Always be Prepared
It's important to have a crisis management plan in place before your organization experiences an attack
network security plan crisis management
November 18, 2021
Know Thyself (Or at Least Know Thy Network)
While attackers must learn the ins and outs of your network, as a defender, you should be...
Defenders network security Network Behavior
November 10, 2021
Product Update: New Features Added to the iboss Cloud Platform
iboss added two new security features to the iboss Cloud Platform. Cloud App Isolation and Exact Data...
Cloud App Isolation Exact Data Match network security Data Loss Prevention DLP cloud security