A Cybersecurity Concept Illustration; A Key Formed from Binary C

Guest Post: Last Mile Communications: Ownership and Security with Lochbox

Last Mile Communications: Ownership and Security with Lochbox INTRODUCTION In 2017, the US Department of Homeland Security issued a security report (DHS, 2017, p. 53) strongly discouraging the use of provably-open mobile calls and SMS text messages while declaring the use of landlines as no more secure. Convenience and complacency are the two main factors […]

Data Identity Woman face dissolving into pixels

Guest Post: The Escalation of Data and Identity Security

The Escalation of Data and Identity Security by George Phipps – VP Strategic Services | NetWize   The role that data and identity security has taken over the past few years has been escalated due to the increased complexity of device and identity threats forcing companies to evaluate and monetize risk. Firewalls and sophisticated Anti-Virus […]