As an IT consultant with 20 years in the business, Arnaud Cassagne has seen — and been part of — the evolution in IT infrastructure that’s been ongoing since the turn of the century. He’s worked with organizations as they’ve […]
Discover top-tier, integrated cybersecurity solutions designed to protect your business. Stay updated on the latest trends in the cybersecurity landscape and learn how advanced threat intelligence and actionable insights can help you swiftly identify and counter today’s most significant cyber threats. Explore our cybersecurity solutions to unlock efficiencies, automate protection, and neutralize threats with transformative security technology and expert consulting.
As an IT consultant with 20 years in the business, Arnaud Cassagne has seen — and been part of — the evolution in IT infrastructure that’s been ongoing since the turn of the century. He’s worked with organizations as they’ve […]
In the first half of our SASE series, we addressed some of the basics of the SASE framework – what it is, who it’s designed for and some common misconceptions about what SASE does and doesn’t do. In the second […]
Is anyone else tired? When looking at the sheer scale of the cybersecurity landscape it can feel like a never-ending stream of changes. Much like Sisyphus pushing the boulder up the mountain, just when you feel like you have a […]
As a relatively new framework, there remains a good deal of confusion around what SASE does and what it wasn’t designed to do. In this post, we’ll take a look at some of the top common misconceptions about SASE and […]
In the first post of our SASE series, we outlined some of the specific challenges SASE addresses and why this model for distributed applications and data represents a more unified and streamlined approach for modern IT organizations. Now we will […]
We are living through a sea change in federal technology procurement. This sea change is more than just modernization mandates. It is the mindset shift from purchasing discrete pieces of infrastructure to architecting a platform that arrays many moving parts […]
Executive Summary In April 2016, Microsoft shocked the PC world when it announced the Windows Subsystem for Linux (WSL). WSL is a supplemental feature that runs a Linux image in a near-native environment on Windows, allowing for functionality like command […]
This quarter we have seen some notable cyberattacks that have captured the public’s attention. With consumers more aware of large-scale attacks, organizations have been under immense pressure to avoid being the next headline. As businesses are working to secure a […]
The technology world has a habit of shifting underfoot, faster than many organizations can run. In the wake of the first two blogs in our three-part series on ransomware, the problem has escalated dramatically. In this post, we want to […]
Executive Summary In early June 2021, Black Lotus Labs identified ReverseRat, a remote access trojan (RAT) operated by a suspected Pakistani actor that was targeting government and energy sector organizations in South and Central Asia. After publishing our initial research, […]