From the Summer 2021 Issue

Zero Trust: Is It All It’s Cracked Up To Be Or Is It Hype? Or A Bit of Both?

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Zero Trust

Few enterprise security technologies have garnered as much attention and hype as Zero Trust over the past decade. Yet, despite all the buzz, there remains a great deal of confusion and uncertainty in the market – is Zero Trust a framework, a reference architecture, or an actual technology? Does the Zero Trust model match the … Read more

Alternatives to Browse the Internet More Securely

Author(s):

Rina Richell, SEO Analytics Manager,

Browse Internet Security illustrate security concept

Browsing the internet can expose your business to a wide array of security risks. In a single browsing session, you can expose your search preferences, activate cooking and tons of other tracking techniques, and even reveal sensitive information on your computer. Additionally, all these can happen even when you’re visiting a reputable site. Regardless of … Read more

Holiday Shopping: How to Stay Safe and Protected

Author(s):

Lauren Abshire, Editor, United States Cybersecurity Magazine

holiday shopping cozy christmas

With Christmas just around the corner and amidst a global pandemic, holiday shopping is at an all-time high. You click a few buttons and wham! You have Christmas delivered right to your door! Exciting stuff, I know. However, in order to keep holiday shopping exciting (and safe!), you must practice vigilance! Cyber-criminals are stronger today … Read more

From the Fall 2019 Issue

Running on a Treadmill: Breaking Through Ingrained, Ineffective Solution Habits

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

harmful-products

Christopher McDougall’s 2009 book Born to Run:  A Hidden Tribe, Superathletes, and the Greatest Race the World Has Never Seen paints a damning picture of an industry dedicated to a profitable but harmful product line. With each successive product generation, the extent of the damage caused by reliance on the product grows, driving purchases of … Read more

From the Fall 2019 Issue

A Paradigm Shift in Data Security

Author(s):

Andres Andreu, Founder / CTO, nTropic Security, Inc.

Data Security-header

Files; we all use them on a daily basis. Undeniably, they are often at the center of successes and failures on many fronts. Files rule the business world from presentations to legal documents. Files also have an enormous impact on our personal lives and, given the proliferation of social media files, are more important now … Read more

Location Tracking: A Privacy Concern

Author(s):

Isabell Gaylord, ,

location tracking connecting a phone and a truck for delivery

If you have a cellphone, you’ve probably used location tracking. Indeed, the majority of consumers are carrying a smart device that is consistently sending out private information like location data. However, smartphones are just one of the many smart devices that are transmitting extremely accurate details concerning the user’s activity and whereabouts. This is not … Read more