News
Stay up-to-date with key insights and tips from Integra Networks related to cyber security, cloud computing, end user computing, and IT infrastructure solutions for government and private sector organizations.
Backdoors Are Hard to Spot, But Not Who Is Using Them
Cybersecurity people have been generally outspoken that backdoors are bad. When governments or intelligence agencies suggest that a phone, cryptography tool, or product have a backdoor installed, both blue and red teams agree that it’s a very bad idea....
Cyber Hygiene: 5 Advanced Tactics to Maximize Your Risk Reduction
All businesses can significantly boost their information security by implementing fundamental elements of cybersecurity – vulnerability scanning, patch application, antivirus and anti-malware tools, firewalls and companywide security policies featuring...
Why National Governments Use IGEL OS for Secure, High-Performance VDI and DaaS
Every day, national governmental agencies face budgetary pressures to do more with less. Meanwhile, the challenges of balancing legacy technologies with new computing requirements are always growing—not to mention ensuring security at every level of the IT stack....
Monitor, Detect and Prevent Advanced Cyber Threats With Falcon Insight for Endpoint Detection and Response (EDR)
At Integra, we empower IT experts to continuously unravel entire cyber attacks—from a threat on a single endpoint, all the way to the threat level of the organization. And we do it using leading endpoint detection and protection solutions like CrowdStrike® Falcon...
Vulnerability Management: How Tenable.sc Helps Organizations See Everything—and Predict What Matters
The very word “tenable” refers to maintaining or defending against attacks or objections. And that’s exactly what our partner Tenable does. Cybersecurity is one of the existential threats of our time. That’s why Tenable has developed its series of...
Has Lenovo just rendered the desk phone extinct?
It’s often said that it takes only 20 days to form a new habit. And if we have learned anything in the past five months working from home, it’s that new habits form much faster than we could ever have imagined. If you had told me six months ago—weeks before the...
Secure Work Must Still be the Priority – at Home and Office
Much focus and attention in recent weeks has rightly focused on work-from-home strategies and business continuity planning. But bubbling up, underneath this topical priority, is an ever-increasing resurgence of security concerns. Initially organisations had to...
Multiple Zero-Day Vulnerabilities in iOS Mail App Exploited in the Wild
Patches for a pair of critical iOS vulnerabilities are currently in beta, as users are strongly encouraged to disable accounts in their Mail app until the fixes are generally available. Update 4/24/2020: The Background section has been updated to include follow-ups...
How to Manage Your Nessus Software Updates
Learn how to take advantage of the newest features in Nessus 8.10 to get greater control over your Nessus experience. Manual or automated – that is the question. Nessus Professional 8.10 offers system administrators a bit of both. From new update options that allow...
Integrated Work from Home: Converging Your Personal and Professional Worlds
So many are now working from home, or at least shut in together. This can abruptly combine your personal and professional life! But it doesn’t have to be a collision; it can be a thoughtful convergence! In this blog I’m helping you merge your worlds so you can work...