Blog for

General

popular topics:

network security cloud security SASE reporting Cloud Adoption zero-trust backhaul secure Internet GDPR compliance virtual desktop infrastructure (VDI) internet access speed cloud connector agent Ransomware network perimeter Zero Trust Network Access packet capture on-prem web proxy appliances plan Redirect YouTube Security Information and Event Management (SIEM) Microsoft Cloud App Security (MCAS) Switching to iboss MDM CASB SD-WAN REvil Kayesa executive order cyber hygiene subscription objects primitives rules conditions risk dashboard cloud connected inventory count Restricted Mode Allow List override block pages country block file uploads iOS iPad Safari Google Classroom Chromebook ChromeOS keyword filter Android Always-on VPN Lockdown mode Wessex Water Rapid deployment cloud-based web security security layers migration to the cloud SIEM Data security Remote device security Cloud Access Security Broker block Dropbox block OneDrive block box.com block Google Drive Reports logs event viewer timeframe callout scheduling reports dashboard IPSec GRE dedicated IP WCCP Tunneling log tuning Block YouTube HD Microsoft Azure Secured Virtual Hubs Microsoft Virtual Hubs VirtualHubs Internet Security Azure Secured Virtual Hubs iboss platform version FireEye Cloud PAC script Apple TLS Apple SSL Knowledgebase Knowledge base GeoZone 9.8.27 malware cloud-hosted ISO standards throttle video UI GUI user interface UX Next Generation User Interface Faster page loads Instant Search Autosuggestion admin console next-gen cloud admin console EA Sports Data Breach Colonial Pipeline JBS Healthcare HIMSS Microsoft 365 Microsoft partnership reverse proxy API CASB Remote Browser Isolation RBI Cybersecurity Awareness Month cybersecurity awareness Be Cyber Smart FedRAMP ATARC Cybersecurity civil cyber fraud vulnerabilities DLP Data Loss Prevention Cloud App Isolation Exact Data Match Defenders Network Behavior crisis management NIST ZTNA Containerization Apache Log4j Log4Shell Threat Landscape Cyber Threats hackers
July 16, 2021
How Healthcare Organizations Can Achieve Fast and Secure Connectivity from Anywhere
Healthcare organizations can achieve fast and security connectivy from anywhere. Securing remote access to patient data is...
Healthcare cloud security network security HIMSS
July 14, 2021
Musings on Threat Intel: The Summer of Ransomware
It seems like every week there is a major breaking story related to ransomware. Two major storylines...
Ransomware cloud security network security REvil Kayesa Colonial Pipeline JBS
July 6, 2021
REvil Ransomware: A Widespread, Sprawling & Dangerous Attack
Right before the 4th of July weekend, news broke of a new ransomware attack against software company...
Ransomware cloud security SASE network security REvil Kayesa
Gaming
June 30, 2021
Why the Recent EA Games Hack Isn’t Child’s Play
It was recently reported that Electronic Arts (EA) was the victim of a cyberattack in which hackers...
cloud security SASE network security EA Sports Data Breach
ransomware
June 22, 2021
Ransomware: Is it Really that Bad?
Ransomware is not new. Attacks such as these are forcing many of the agencies in the United...
Ransomware cloud security SASE network security zero-trust
iboss and Microsoft Azure Working Together to Enable Secured Virtual Hubs
November 6, 2019
iboss Delivers SaaS Cloud Security for Microsoft Azure
Automatically secure Internet access for Microsoft Azure connected users, devices and servers with iboss cloud. Together, iboss and...
Azure Secured Virtual Hubs Internet Security VirtualHubs Microsoft Virtual Hubs Microsoft Azure Secured Virtual Hubs