Blockchain Technology: From Hype to The Future

Author(s):

Blockchain Technology

The mysterious blockchain technology. Well, it was mysterious. In fact, at one point, it was futuristic. And there was so much hype around it, yet so many differences, that nobody really trusted it. But what happened? Blockchain technology moved from hype to the future. It’s something most people know about, understand, and are interested in … Read more

The Importance of Cybersecurity in Mental Health Services

Author(s):

Frankie Wallace, ,

Cybersecurity in Mental Health

The importance of cybersecurity in the modern world cannot be understated. Over the last two years, we’ve seen cybercrime take off as criminals attempt to leverage pandemic fears and insecurities to steal money from the average citizen. COVID-19 birthed a second pandemic of cybercrime, and those using virtual tools for mental health services are uniquely … Read more

Unified Endpoint Management and Security: Breaking Down the Silos

Author(s):

Achuthan Ramesh, Senior Product Marketer, ManageEngine

Endpoint Management and Security

Consider the case of a smart home. Smart home systems offer life safety monitoring using carbon monoxide detectors, smoke detectors, and flood sensors along with home automation technology such as smart locks, smart thermostats, and smart bulbs. Now, imagine using a different tool for each of the above smart home capabilities—suddenly, smart homes don’t seem … Read more

Implementing Application Control and Eliminating Productivity Dips

Author(s):

Ameera Azeez, Product Specialist, ManageEngine

Application Control

Application control, an integral step in achieving comprehensive endpoint security, often comes with implementation difficulties. Many organizations prioritize productivity issues over security issues, and tend to postpone taking the required measures to ensure their infrastructure is continually secure. However, if effectively executed, application control is a valuable addition to any organization’s security framework.  Here are … Read more

5G Technology and Cybersecurity

Author(s):

Rina Richell, SEO Analytics Manager,

5G Technology and Cybersecurity

The rave that came in with the advent of 5G Technology was well-founded with the promise of promoting smart cities, a much faster internet connection for cell phones, and faster data download and upload speeds. This technology, by every standard, deserves to be received and celebrated. With the advancement of 5G came new possibilities not … Read more

Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): What is the Difference?

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

IPS-IDS-Firewall

An Intrusion Prevention System – or an IPS – is a network security technology (and control system) that monitors networks and traffic for any vulnerability exploits or malicious activity. IPS will automatically either allow or deny the detected traffic (good or bad) based on its established ruleset. An Intrusion Detection System – or an IDS … Read more

DLP Technology – Why Does it Fail?

Author(s):

Alex Haynes, CISO , IBS Software

DLP Technology

Long ago, before GDPR, there was a class of technology called DLP that claimed to solve all your data leakage and data protection issues.  An acronym that stands for “data loss prevention” (it can also be referred to as “data leakage protection” or “data loss protection,” depending on who you are talking to) was supposed … Read more