Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Endpoint Posts
What Are Endpoints (& How Does Endpoint Security Work)?
Summary of Key Points Endpoints are access points to an organization’s network—including tablets, smartphones, laptops, desktops, and any other device that can access your digital information. IoT...
The Digital Partridges in the Cybercrime Pear Tree
The holidays may be a time for spending time with loved ones and exchanging gifts, but the gifts cybercriminals bring aren’t jolly at all. 2020 Has been a rough year, and many organizations have...
Airports are a Hackers Best Friend (& Other Ways Users Expose Themselves to Risk)
Traveling is stressful, even when things go smoothly. Your routine is disrupted, you are in an unfamiliar place, and there is a good chance you are not as well-rested as usual. This can make you...
Keeping Your Network Secure in a "Bring Your Own Device" World
Last updated August 19, 2022 Summary: Bring Your Own Device (BYOD) policies can save companies money on equipment and make employees more productive, but they also create potential cybersecurity...
The IoT is Really the Internet of Endpoints
Last updated September 27, 2022 Summary: IoT devices make life more convenient, but constant connection to a network also makes you more vulnerable to potential cyberattacks.An endpoint is any...
Latest Posts
Cybersecurity in 2025: Current Trends & Future Predictions
The world of cybersecurity is a rapidly evolving one. Each year, hackers and other bad actors utilize a new set of advanced tools that are designed to steal the data of organizations with vulnerabilities in their security stacks. Keeping on top of the latest trends in...

Advanced Threat Prevention with Palo Alto: Strategies and Tools
The modern attack surface for businesses operating over digital networks is a complex beast. The rapid growth of hybrid workforces and evolving technologies makes protecting your network from outside forces a daily struggle. At risk are your organization’s assets and...
Cybersecurity Challenges in the Age of Remote Work
The world has recently and rapidly adapted to a new reality where remote workers make up a significant percentage of the workforce. While many workers have been going back to the office over the past couple of years, Upwork estimates that roughly 22% of the workforce...