1. Why Your Small Business Should Begin to Think In Terms of Endpoints

    Operating a small or medium-size business in the 21st century comes with a ton of helpful technology, apps, and devices that keep you connected, allow you to do your job, and streamline or automate your work. However, those apps, devices, and machines also bring with them an inherent risk of being compromised, and a severe enough threat could even bring your business to a halt or let sensitive dat…Read More

  2. Virus Definitions vs. Machine Learning: Why Cylance protects you better

    In the old days, antivirus software was that clunky, memory-hogging thing that constantly needed to connect to the internet to download virus definitions. Virus definitions are like a library of known threats and malicious files, and if you didn’t have the latest virus definitions, you weren’t protected from the most recent threats. The Problem The problem with virus definitions is not necessa…Read More

  3. System Engineer

    System Engineer You'll investigate, communicate, and troubleshoot escalated issues coming from our client support and professional services teams, while collaborating with system, release, and development engineering colleagues to determine the root cause of technical issues and the best course of action to resolve them. Monitor systems and products on a daily basis to ensure systems are performin…Read More

  4. Virtual Chief Information Security Officer (vCISO)

    The Chief Information Security Officer plays the key role in managing and setting the goals for Information Security initiatives for our clients. This role will require regular interaction with technical and business resources across the enterprise and throughout the overall IT organization. The ideal candidate is a committed, creative, and self-motivated technologist who is interested in practici…Read More

  5. Penetration Tester

    We are currently looking for Penetration Testers (Ethical Hackers) highly proficient in PCI-DSS compliance requirements to join our rapidly expanding team. As part of the Information Security Team, the candidate(s) will: Perform internal and external penetration tests Perform onsite security testing including social engineering and wireless network tests Perform vulnerability scans Assist in th…Read More