Our Blog
Home / Blog

Fortinet and TAA Compliance: Exceeding Best Practices
Like many companies that sell to the United States Federal government, Fortinet adheres to the rules related to the Trade Agreements Act (TAA). The TAA was enacted in 1979 to foster fair and open international trade, based on trade agreements between the United States...

What is the Zero Trust security model, and why is its adoption growing?
Zero Trust promotes the concept that organizations should not trust any entity inside or outside their network perimeters in a predetermined fashion.Adoption of the Zero Trust security model is picking up steam at last. In February 2020 – before the pandemic swept the...

Vendor Workspace, Don’t Leave Home Without It
So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...

JSON Web Token attacks and vulnerabilities
JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...

Infographic: Securing Devices with MetaDefender Drive
The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home - and now back to the office - have created a wide range of cyber attack vectors through personal and unauthorized devices. Data...