Don BoxleyHow to Increase Cybersecurity in the Energy Industry During COVID-19No matter the industry, when it comes to cybersecurity, one thing is clear — working remotely is a double-edged sword.Sep 25, 2020Sep 25, 2020
Don BoxleySoftware Defined Perimeters + Local Security: A One-Two Punch Against Ripple20 VulnerabilitiesIndependent cyber security research group JSOF recently discovered 19 security vulnerabilities, called “Ripple20,” based on their ripple…Sep 8, 2020Sep 8, 2020
Don BoxleySmart Endpoints, Software Defined Perimeters Transform Cloud-Based Disaster Recovery (DR)Disaster Recovery (DR) is one of the most significant drivers compelling organizations to migrate to the cloud. Cloud-based DR provides a…Aug 10, 2020Aug 10, 2020
Don BoxleyHow to Bake Security Into Your Raspberry Pi to Ensure IoT ProtectionThe Internet of Things (IoT) has taken center stage for the general population, as IoT devices have mushroomed throughout industries and…Jul 1, 2020Jul 1, 2020
Don BoxleySmart Endpoints and Dumb — But Secure — PipesSoftware engineers know all about microservices — but if you’re not a developer, then you might need a primer. This increasingly popular…Jun 1, 2020Jun 1, 2020
Don BoxleyCan Software-Defined Perimeters Help Protect the NBA Draft from Hackers?The 2020 NFL Draft was held remotely this year for the first time in history. With a global pandemic in full swing, the originally…May 11, 2020May 11, 2020
Don BoxleyBlockchain Has Graduated from Red to White-Hot — But Its Still Not That Secure…Here’s How You Can Protect Your Data.May 6, 2020May 6, 2020
Don BoxleyExposing the Myth of VPN SecurityWhy Today, Your VPN Is Actually Multiplying Your Data Security Vulnerabilities — Exponentially…Apr 7, 2020Apr 7, 2020