3 August, 2017 | Michael Ustinov

Top 4 IT Security Trends to Keep an Eye On

With attacks getting increasingly frequent and sophisticated, the traditional approach to shielding your IT ecosystem is no longer working. You can’t simply tie hands of “bad guys” and give full privileges to “good guys” because you can’t know which users you can actually trust. For...
17 November, 2016 | Russell Smith

Windows Information Protection: Your Private Security Helper

Windows Information Protection (WIP) provides organizations with a set of features to support a Mobile Device Management (MDM) system and enable separation of corporate and personal data to prevent leaks. In this article, I'll explain how WIP works. Why Use WIP? As corporate data becomes...
28 September, 2016 | Alex Vovk

Yahoo Data Breach, Part 2: Safety Tips for Users

After Yahoo confirmed serious data breach many of its users chose to block or delete their accounts. Nevertheless, this action doesn’t re-establish data privacy and doesn’t ensure that this information won’t be sold and used by the third parties. In this blog post we discuss the impact...
Show more articles