Thought Leadership
Contact Us
Jun 18, 2020
Article by
Michael J. Sever
Network Security
Remote Workers
Cyber Security

Reduce Threats When Using RDP-Type Access Methods

With remote workplaces becoming the “new normal,” businesses and institutions are struggling to provide their employees with secure off-premise access to critical sensitive systems and data.

Read More
May 28, 2020
Article by
Barbara Hunt
Secure VPN
VPN Web
Remote Workers

VPN Vulnerabilities

Today’s VPNs can provide a secure point-to-point tunnel between two devices, an origin and a destination. The level of security across a VPN is largely dependent upon the type of encryption that is used to encapsulate the transmission.

Read More
Apr 13, 2020
Article by
Barbara Hunt
Anonymous Web Browser
Network Security
Virtualized Network

Remote Workers Can Compromise Your Communications Network

It is a strange new world for most businesses. More workers than ever are working remotely from home…across all industries, and products and solutions. Examples of the effects of this new reality are in the news daily.

Read More
June 18, 2020
Article by
Michael J. Sever
Remote Workers
Network Security
Cyber Security

Reduce Threats When Using RDP-Type Access Methods

With remote workplaces becoming the “new normal,” businesses and institutions are struggling to provide their employees with secure off-premise access to critical sensitive systems and data.

Read more
May 28, 2020
Article by
Barbara Hunt
VPN Web
Secure VPN
Remote Workers

VPN Vulnerabilities

Today’s VPNs can provide a secure point-to-point tunnel between two devices, an origin and a destination. The level of security across a VPN is largely dependent upon the type of encryption that is used to encapsulate the transmission.

Read more
April 13, 2020
Article by
Barbara Hunt
Network Security
Anonymous Web Browser
Virtualized Network

Remote Workers Can Compromise Your Communications Network

It is a strange new world for most businesses. More workers than ever are working remotely from home…across all industries, and products and solutions. Examples of the effects of this new reality are in the news daily.

Read more
February 15, 2020
Article by
Barbara Hunt
SD-WAN
VPN Web
SASE

Cloud-Delivered Secured Access Service Edge (SASE): Comprehensive network security with WAN capabilities

Gartner Group has recently published research and thought leadership pieces that discuss SASE

Read more
January 5, 2020
Article by
Steve Bay
Cloud Networking
Cloud Browser
Dark Web Access

Cloud Vulnerabilities

Recent cyber activity now suggests that it isn’t just networks that are vulnerable to cyber attacks. A 2019 year-end article in the Wall Street Journal identifies Chinese cyber attackers that were found lingering in the cloud, collecting data.

Read more
January 20, 2020
Article by
Barbara M. Hunt
Cybersecurity
Network Security
Virtualized Network

Network Vulnerabilities

Are company CISOs (Chief Information Security Officers) aware of the vulnerabilities of the networks they are using to transmit valuable and proprietary data through their chosen communications networks?

Read more

Our Bloggers

Barbara Hunt

Founder and CEO, NetAbstraction

Barbara is a recognized expert in information and telecommunications technology and operations, based on her extensive experience in the Intelligence Community (IC). She is a sought-after speaker and presenter in the cyber communications market.

Steve Bay

(Founder and) Consultant on Identity Protection

Steve spent 30 years with the Central Intelligence Agency, primary as an overseas field Intelligence collector and then operations support manager. As a former practitioner in the use and acquisition of alternate identities, he provides thought leadership on operational threat assessments and identity protection implementation strategies.

Michael J. Sever

Chief Operating Officer

Mike has 33 years of experience with the Central Intelligence Agency in the fields of cyber development, technical collection and telecommunications. He is responsible for all technical development.


Related Content
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More
Post by topics

Subscribe

Sign up for the latest posts and updates from NetAbstraction.

Subscribe
2020
NetAbstraction