<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog


Recent Posts

Round Hole, Square Peg: Legacy Remote Access in Today’s Environment

[fa icon="calendar'] Jan 27, 2016 6:03:43 AM / by [email protected] posted in Blog

[fa icon="comment"] 0 Comments

As security professionals, it's our responsibility to maintain awareness about the goings on within the security space. It might include doing our research and reading all the publications, or emails from friends, colleagues and even family. For those who fancy a bit more organization, maybe just crawling LinkedIn, Reddit, or Google Alert feeds on a daily basis. In any case, you're bound to come across a litany of articles about security vulnerabilities, strategies, and threats. The most recent collection of interesting tidbits are those relating to the backdoors identified in some of the top firewall technologies (Juniper, Fortinet, and possibly others). I found myself scrolling through my own LinkedIn feed while waiting on the tarmac returning from a recent trip, when I received another email about the latest backdoor issue. Since I had nowhere else to be for the next few hours, I decided this was a good time to try and wrap my head around it all and maybe discern more than just a little ammunition for the obligatory security small talk at the next industry event. So with the hum of jet engines and the faint glow of the overhead cabin lights, I went to work.

Read More [fa icon="long-arrow-right"]

The Vulnerable End User

[fa icon="calendar'] Oct 29, 2015 10:46:30 AM / by [email protected] posted in Blog

[fa icon="comment"] 0 Comments

Throughout enterprises large and small, a very real (although often overlooked) threat to the security of an organization lies within the confines of their 4 walls…the end-user. This is not to say that end-users are the root of all-evil, far from it. They are the heart and soul of your company, they make sure your business runs smoothly and effectively; however, these same end-users are also a prime target. With a wide array of cybercrime opportunities such as phishing, watering hole attacks and other social engineering tactics which do not necessarily rely on sophisticated malware or technical vulnerabilities, but rather the prey on the mindset and behavior of people, an uneducated or careless employee or an overcomplicated procedure can result in sensitive information leaking and potentially falling into the hands of an attacker.

As cloud adoption and mobility efforts are rapidly rising, methods in which to access corporate resources and data (and the devices used to access them) have increased at an exponential rate. Left unchecked, this ubiquitous style of access can soon evolve to an unmanageable state and introduce far more risk due to the inherent complexity. When factoring in the Human Element, it is becoming more and more evident that people matter just as much as technology. If organizations are to successfully (and consistently) mitigate these risks across multiple planes, it is imperative that Security teams move beyond only focusing on the technological controls and begin to develop a culture of security-aware employees who can effectively act as an extension of your security program, rather than a threat to the organization.

Read More [fa icon="long-arrow-right"]

StageFright Spotlights the Need for Zero Trust

[fa icon="calendar'] Jul 30, 2015 4:34:38 PM / by [email protected] posted in Blog

[fa icon="comment"] 0 Comments

The breaking news of the Stagefright vulnerability that could allow hackers to silently and completely take over any of the 950,000 Android devices on the market has got to give us, as enterprise IT and security professionals, pause to ask again how much we can trust even our own company’s employees.

Read More [fa icon="long-arrow-right"]

Why I Joined Soha

[fa icon="calendar'] Jun 8, 2015 8:56:43 AM / by [email protected] posted in General, Company, Blog

[fa icon="comment"] 0 Comments

After first learning of Soha nearly a year ago, I immediately began thinking about how they addressed many of the challenges I was currently facing in exposing internal (campus-type) applications to my BYOD Enterprise Users (e.g. Jira, Confluence, Dashboards, IM, etc.). As the months passed and “cloud” utilization conversations resumed to potentially include sensitive customer-facing applications/data, I frequently asked myself, “Would Soha work for this too?” As it turns out I was not the only one asking this question. When I finally circled back with Soha to see what was new, I was surprised to see just how much progress had been made against what I had hoped Soha would develop, and the speed in which it was brought to release.

Read More [fa icon="long-arrow-right"]