Author’s Note: I write my own blogs. That’s unusual. Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them –...
Author’s Note: I write my own blogs. That’s unusual. Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them – to...
Until just recently, there was really just one secure remote access method – Virtual Private Network, or VPN. But in the last few years, there are two new remote access methods you’ve heard of or will shortly – ZTNA and SASE. A quick overview of these access...
We have seen the public impact of the recent global IT meltdown – days of cancelled/delayed flights, 911 systems that were down, and other government and commercial organizations essentially put on hold. Unfortunately, this is very unlikely to be the last such...
We all have gone into a high security building and saw those large cameras pointing down at us. In those same buildings, we’ve seen doors that were opened with the whisk of a little white card. But now, the convergence of computer networks and this physical security...
Well, maybe not yet, but it’s definitely moving in that direction. The basic tenant of current security is that you authenticate using 3 types of information: Something you are, such as a username or email address. Something you know, such as a password or PIN. ...