ThreatLocker Application Control Quick Start Guide

ThreatLocker Application Control Quick Start Guide ThreatLocker Application Control gives you the ability to control applications and storage devices are used in your Organization. Our service is delivered from the Cloud and requires a small agent to run on each computer.

Read more

Threatlocker Enables the Essential Eight

ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought it was worth the effort to provide a quick breakdown of how ThreatLocker can enable this critical strategy for Australian Businesses.

Read more

Anti-Vaxxing and Cyber Security

I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.

Read more

A Simple Remedy for the Ransomware Epidemic.

Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.

Read more

Control Access – Don’t Block Storage Devices

Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]

Read more