By

Lindsay Melnick
Written by: Pooja Deshmukh from Zscaler Are you a frequent traveler? If so, you probably participate in at least one rewards program in which you accrue airline miles or earn hotel points. The hospitality industry practically invented these loyalty programs and they’ve been enormously popular, delivering value to customers and merchants alike. It turns out, membership account...
Read More
Did you know that the majority of cybersecurity threats you encounter come through the internet? When you are surfing the internet, your computer, your network, and your data is in critical danger of being breached. Internet security is mandatory for any organization. Internet security is the foundation of a multi-layered approach to cybersecurity. To keep...
Read More
Written by Hamilton Yang, Sat Nath, and Peter Uys from Crowdstrike The recent discovery of the Remote Code Execution (RCE) vulnerability CVE-2018-4407 in Apple’s XNU operating system kernel may have been a cause for concern among organizations using Macs but CrowdStrike® is helping customers identify vulnerable Macs in their environments with a new dashboard. The XNU OS...
Read More
Written by: Jen Toscano of Zscaler The last installment in our series on the five critical elements of branch transformation is elastic scalability. In a cloud context, scalability allows your business to be nimble because cloud infrastructure and apps automatically keep up with your requirements no matter how large they become. Security stays strong and...
Read More
Written by Jackie Castelli from CrowdStrike- While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to China, the software supply chain has already proven to be vulnerable with numerous attacks covered. Yet, even though these attacks seem to be making headlines more frequently, they are far...
Read More