Entries by Website Administrator

Is an Infrastructure War on the Horizon?

We have seen a paradigm shift in the role the Federal government is expected to play in cyber security. Until recently, it was assumed that companies (along with educational institutions and state and local governments) were responsible for their own cybersecurity. Now, it’s clear that cyber crime doesn’t merely threaten individuals or individual companies – it threatens the common infrastructure that we all depend on. Conceal CEO, Gordon Lawson explains why companies and public works organizations that comprise our infrastructure need to be more diligent than ever in managing vulnerabilities and defending their endpoints.

How Zero Trust Can Protect Your Company from the Inside Out

Designing and building a zero-trust framework begins with a critical acknowledgment: The perimeter is dead. Today’s highly interconnected world—linked by clouds, containers, APIs and more—means that there’s no way to place a guard at the palace entrance to stop intruders from entering. Zero Trust requires a completely different mindset, and it extends beyond vendors and technology. Gordon Lawson CEO explains how Zero Trust can protect your business, along with best practices advice for implementing a Zero Trust framework

Cyberwarfare Landscape Changes: How To Play Defense

Over the past five years or so, we’ve observed lines blur when it comes to warfare. Combat is no longer always on the physical battlefield; instead, wars can now be fought from bedrooms or coffee shops. In an interview with Cybersecurity Ventures, Miller, together with Gordon Lawson, chief executive officer of Conceal, explained how the warfare landscape is changing and why there is a gradual shift to the defensive side of the coin.

ConcealBrowse isolates malicious software before it can work its mischief

More threat actors are exploiting the browser as an attack vector, largely because it’s becoming a popular way to access corporate applications and resources. As a means to counter browser-borne malicious software, such as Trojans, worms or ransomware, ConcealBrowse can be planted on an endpoint by a network administrator where it will monitor all code as it runs to determine if it presents a threat to an organization.