On a Path to Protection? Discover Your Devices

On a Path to Protection? Discover Your Devices

3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...
Security Failure by Default

Security Failure by Default

3:00 min read The principle of least effort is sensible in many cases, but it’s a poor guide to computer security and an uncomplicated human security risk. If a device or software service comes with a default password, failing to change it will open security...