Our Blog
Home / Blog

Welcome to the Unbound Enterprise
Looking back before 2020, we knew where the digital transformation was taking us. But we had no idea how quickly it would arrive. Because of the pandemic, our journey to cloud migration happened at light speed. As a result, businesses today are now less constrained by...

Babax stealer rebrands to Osno, installs rootkit
Babax not only changes its name but also adds a Ring 3 rootkit and lateral spreading capabilities. Furthermore it has a ransomware component called OsnoLocker. Is this combination as dangerous as it sounds? Emergence of Babax and Osno Babax stealer is at least around...

Orchestrating data security through effective data identification
As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “Age of Data”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater...

China’s Personal Information Protection Law: What We Know So Far
On 21 October 2020, China’s Standing Committee of the National People’s Congress published the first draft of the Personal Information Protection Law (PIPL) for public comment. The PIPL is China’s first attempt to integrate and expand its provisions on the protection,...

Security and Networking Must Converge to Enable Any “Edge” at Any Scale
Start reading and you will find many articles and estimates about when organizations are planning to bring employees back to the office. And you won't be blamed for thinking there are as many expert opinions on the subject as there are individual organizations...