by Matt Douglass | Jul 27, 2023 | Blog, Security
SASE (SD-WAN + SSE) is critical for the security of modern businesses. The CBTS best-of-breed approach produces the best results for the success of long-term managed services. What exactly is SASE (pronounced “sassy”)? It’s a framework that unites security and...
by Neal Marksberry | Jul 19, 2023 | Blog, Communications, Digital Workspace, Security
The rising digital workplace must merge UcaaS and collaboration and security solutions, but without proper implementation, your organization may be overlooking potential vulnerabilities. The security landscape of the digital workplace As the paradigm of work has...
by David Leech | Jun 28, 2023 | Blog, Security
Most organizations and enterprises rely on their IT systems and the Internet to develop, build, and sell their products and services. Moreover, they often use a complicated web of contractors and vendors that are integrated into those IT systems, creating a...
by Jon Lloyd | Apr 19, 2023 | Blog, Security
Ten years ago, implementing a single firewall per business location was considered an adequate security practice. However, a single firewall is not sufficient in this age of remote and hybrid access where criminals and threat actors actively target your company. Why?...
by David Leech | Mar 22, 2023 | Blog, Security
The recent clamor of legislative activity on Capitol Hill contains several common themes as the government branch makes moves to secure the U.S. cyber environment and solidify cybersecurity law. The most noticeable is a recognition that voluntary action in the cyber...
by David Leech | Mar 15, 2023 | Blog, Security
What is zero trust? The term zero trust is becoming more commonplace, with virtually every vendor claiming their products support a zero trust architecture (ZTA) or zero trust network architecture (ZTNA). Much of the buzz is driven by Executive Order 14028, which...
Recent Comments