Make Sure Your Cybersecurity is Tight With Kobargo

The old adage tells us there are two things in life which are inevitable: death and taxes. In today’s digital environment, we should add a third item to that list of things we can’t avoid: cyberattacks. While you might think they are a relatively new phenomenon,...
More

What to Look for in an IT Consultant

Technology has grown to be an integral part of our everyday lives. The majority of people nowadays cannot perform their routine tasks without support from technology, whether that be laptops, smartphones, computers, or tablets. If you have ever encountered a problem with any of these...
More

Security “of” the Cloud vs Security “in” the Cloud

There are plenty of good reasons to move to the cloud such as reducing hardware and software costs, recovering valuable office space used to store hardware, scaling compute and storage resources and only paying for what you use. These are just some of the advantages...
More

HTTPS Interception Weakens TLS Security

TA17-075A: HTTPS Interception Weakens TLS Security Systems Affected All systems behind a hypertext transfer protocol secure (HTTPS) interception product are potentially affected. Overview Many organizations use HTTPS interception products for several purposes, including detecting malware that uses HTTPS connections to malicious servers. The CERT Coordination Center (CERT/CC) explored the...
More