Blog for

General

popular topics:

network security cloud security SASE reporting Cloud Adoption zero-trust backhaul secure Internet GDPR compliance virtual desktop infrastructure (VDI) internet access speed cloud connector agent Ransomware network perimeter Zero Trust Network Access packet capture on-prem web proxy appliances plan Redirect YouTube Security Information and Event Management (SIEM) Microsoft Cloud App Security (MCAS) Switching to iboss MDM CASB SD-WAN REvil Kayesa executive order cyber hygiene subscription objects primitives rules conditions risk dashboard cloud connected inventory count Restricted Mode Allow List override block pages country block file uploads iOS iPad Safari Google Classroom Chromebook ChromeOS keyword filter Android Always-on VPN Lockdown mode Wessex Water Rapid deployment cloud-based web security security layers migration to the cloud SIEM Data security Remote device security Cloud Access Security Broker block Dropbox block OneDrive block box.com block Google Drive Reports logs event viewer timeframe callout scheduling reports dashboard IPSec GRE dedicated IP WCCP Tunneling log tuning Block YouTube HD Microsoft Azure Secured Virtual Hubs Microsoft Virtual Hubs VirtualHubs Internet Security Azure Secured Virtual Hubs iboss platform version FireEye Cloud PAC script Apple TLS Apple SSL Knowledgebase Knowledge base GeoZone 9.8.27 malware cloud-hosted ISO standards throttle video UI GUI user interface UX Next Generation User Interface Faster page loads Instant Search Autosuggestion admin console next-gen cloud admin console EA Sports Data Breach Colonial Pipeline JBS Healthcare HIMSS Microsoft 365 Microsoft partnership reverse proxy API CASB Remote Browser Isolation RBI Cybersecurity Awareness Month cybersecurity awareness Be Cyber Smart FedRAMP ATARC Cybersecurity civil cyber fraud vulnerabilities DLP Data Loss Prevention Cloud App Isolation Exact Data Match Defenders Network Behavior crisis management NIST ZTNA Containerization Apache Log4j Log4Shell Threat Landscape Cyber Threats hackers
cybersecurity
October 21, 2021
Thoughts on the Civil Cyber Fraud Initiative
Organizations need to prioritize strengthening their cybersecurity postures, and ensure they prepared for a cyberattack
vulnerabilities civil cyber fraud executive order network security Cybersecurity
October 11, 2021
Putting Trust in Zero Trust
As the network perimeter erodes and the legacy security boundary changes, iboss will enable Agencies to address...
ATARC executive order FedRAMP zero-trust network security SASE cloud security
October 1, 2021
iboss is a Proud Cybersecurity Awareness Month Champion
October is Cybersecurity Awareness Month, and iboss has commited to be a Champion. We'll offer tips on...
Cybersecurity Awareness Month Be Cyber Smart cybersecurity awareness Cloud Adoption network security SASE cloud security
September 24, 2021
How to Support the Modern Workforce in a Cloud-First World
iboss is hosting a webinar series that will dive into 5 steps to consider when migrating to...
cloud security SASE network security Cloud Adoption
September 8, 2021
5 Steps to your SASE Journey
iboss is hosting a webinar series that will dive into 5 steps to consider when migrating to...
Cloud Adoption network security SASE cloud security
August 27, 2021
5 Steps to your SASE Journey – Step 3: Adopting Zero Trust
iboss is hosting a webinar series that will dive into 5 steps to consider when migrating to...
cloud security SASE network security Cloud Adoption