news

Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More

Gartner Highlights Dell’s Use of SafeConnect

When considering IT products, it is often critical to choose products that can work with one another. Users of Dell EMC’s networking products should rest assured Impulse’s SafeConnect solution integrates so well with Dell’s networking products that the products’ ability … Read More

How to Decide Which IoT Devices to Allow

Today’s smart devices allow us to do everything from change the temperature of our oven to find our car keys. But the potential security threat these devices pose is a serious matter. A Gartner survey found that almost 20 percent … Read More

How to Stop your K12 Students from Accessing Inappropriate Websites

Most schools receiving federal funding are required to block inappropriate websites. This is usually accomplished with content-control software, but some students use proxies to get around these restrictions. Fortunately, there are ways school administrators can limit access to inappropriate websites … Read More

Purdue Blocks Streaming Sites to Maximize Bandwidth

Purdue University has a radical solution to its bandwidth problem: blocking streaming services from lecture halls. Blocked sites include Netflix, Apple Updates, iTunes, Hulu and Steam. What is blocked? The university blocked the aforementioned streaming sites from four of its … Read More

Recent Chinese Hardware Hack Emphasizes Network Segmentation’s Importance

With most of the world’s hardware manufactured in China, it was perhaps a matter of time before Chinese hackers exploited hardware to spy on government organizations. According to Bloomberg, this week marked the announcement of a hardware vulnerability implanted by … Read More