About Us | Contact Us
View Cart
Author Archive

The Changing IT Landscape and Endpoint Detection and Response (EDR)

By Steven Jakubin - Last updated: Monday, May 9, 2022

Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]


Managing Software Supply Chain Risk

By Steven Jakubin - Last updated: Monday, April 25, 2022

Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycle, however what if these kinds of updates also include deliberately malicious code? […]


The Importance of Proper Multi-Factor Authentication (MFA) in 2022

By Steven Jakubin - Last updated: Monday, February 28, 2022

Not just because it is becoming an issue of compliance. . . We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a secured vault. These vaults use several […]