by Christine Thome | Aug 17, 2018 | Networking, Uncategorized
Where a Second Lost on the Network has Insurmountable Consequences Originally published on Network World | JUNE 22, 2018 | by Norman Rice, Chief Marketing, Development, and Product Operations Officer of Extreme Networks The network edge is the new...
by Christine Thome | Jun 5, 2018 | Uncategorized
Although many industries have long offered product warranties to assure customers the products they purchase will function as advertised, this has not been true for cybersecurity. When a security product fails, customers have had little recourse — until now....
by Christine Thome | May 25, 2018 | Uncategorized
Most of Chi’s customers live in the United States and are not subject to GDPR. However, some of our customers operate multi-nationally so we felt a statement was prudent. 1. This is not a legal document. This is simply a statement of our commitment to our...
by Christine Thome | Apr 3, 2018 | Uncategorized
Google’s Gmail for Business Offers High False Positives Excerpted from the March 28, 2018 IRONSCALES Blog, written by Eyal Benishti Google’s Gmail for Business has had an overhaul and now claims to offer AI-powered security features. According to its marketing...
by Christine Thome | Jan 31, 2018 | Uncategorized
Excerpted from the Barracuda Blog, by Christine Barry It’s Tax Identity Theft Awareness Week in the United States, which means that tax-related identity theft happens often enough to get the government’s attention. The Federal Trade Commission...
by Christine Thome | Jan 5, 2018 | Uncategorized
Excerpted from Cylance Blog, January 4, 2018 Chip manufacturers have acknowledged a set of vulnerabilities (CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754) that are exploitable at the hardware architecture level, leaving multiple operating systems impacted,...