IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the...
Podcast: How DevOps Teams Use Network Monitoring Tools

Podcast: How DevOps Teams Use Network Monitoring Tools

Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven...
What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....