Blog

Blog2018-12-26T21:39:37-06:00

Blockchain Expo Recap: What’s Buzzing in Blockchain?

Blockchain conferences used to focus on cryptocurrency, disruption and hackathons. However, recent attendance at the Blockchain Expo North America showed a significant shift in the blockchain landscape. There is now less focus on cryptocurrency and [...]

By |December 9th, 2019|Categories: Blog|Tags: , , , , |Comments Off on Blockchain Expo Recap: What’s Buzzing in Blockchain?

Create a Value Blizzard with Snowflake and Microsoft Azure

There are many benefits of using a cloud-based data warehouse, and the market for cloud-based data warehouses is growing as organizations realize the value of making the switch from an on-premises data warehouse. Apart from [...]

By |December 4th, 2019|Categories: Blog|Tags: , , , , |Comments Off on Create a Value Blizzard with Snowflake and Microsoft Azure

5 Ways to Get Wise on Business Email Compromise (BEC)

NPR’s All Things Considered recently ran a story about the persistence of email cybercrimes and the techniques used by cybercriminals to steal money from their victims. This year alone, the U.S. Department of Justice, in [...]

By |November 27th, 2019|Categories: Blog|Tags: , , , , , , , , , |Comments Off on 5 Ways to Get Wise on Business Email Compromise (BEC)

Legacy to Next-gen: Evaluating Your Endpoint Security

Protecting endpoints against evolving threats is challenging. Malware is getting more and more evasive. Endpoints are gaining in volume, disparity, and distance from your data center. Your legacy anti-virus (AV) is no longer up to [...]

By |November 25th, 2019|Categories: Blog|Tags: , , , , , |Comments Off on Legacy to Next-gen: Evaluating Your Endpoint Security

Secure Your IoT Data With a Zero-Trust Strategy

If you’ve felt like new reports of data hacks and security breaches are becoming more common, it’s not your imagination. The rise of the Internet of Things (IoT) as one of the fastest-growing device categories [...]

By |November 22nd, 2019|Categories: Blog|Tags: , , , , , , , , , , |Comments Off on Secure Your IoT Data With a Zero-Trust Strategy