by Michele Dietrich | Feb 9, 2018 | Blog
3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...
by Michele Dietrich | Jan 23, 2018 | Blog
3:00 min read The principle of least effort is sensible in many cases, but it’s a poor guide to computer security and an uncomplicated human security risk. If a device or software service comes with a default password, failing to change it will open security...