Still Running 2016 Security in a 2026 Threat Landscape?

Leapfrog Your Defenses Today Small and midsize businesses (SMBs) face many of the same cybersecurity threats as large enterprises, but the way you prepare for and respond to those threats should be very different. Too often, security advice for SMBs is borrowed directly from enterprise playbooks. That advice typically adds layers of complexity to legacy …

Read more

Blindsided by VMware? How To Regroup and Come Out Ahead

If you’re one of VMware’s 500,000 customers, you have some decisions to make…quickly. VMware, now owned by Broadcom, recently announced it will no longer sell perpetual licenses (or related support) and will sell subscription licenses instead — which will cost customers significantly more in the long run. Most of Leapfrog’s clients use VMware products and …

Read more

Should You Hire or Upskill to Leverage AI?

Getting the business results you want from generative AI isn’t easy — there’s a definite learning curve. What’s the fastest way to get up to speed? Information Week explores this issue in Hire or Upskill? The Burning Question in an Age of Runaway AI. Leapfrog is glad to weigh in — we’ve been enthusiastically helping …

Read more

Security and Maturity: Today’s CIOs Take Center Stage

About a decade ago, the CIO’s main goal was to oversee a team to manage the technology of a company and control costs. Annual IT initiatives often included finding ways to take something expensive — existing technology — and make it cheaper so that the budget could be used for other initiatives. Innovating or delivering …

Read more

Zero-Day Attacks and Zero-Trust: Clearing Up “Zero” Confusion

A zero-day attack can cripple a company. A “zero trust” strategy protects a company. But can a zero trust strategy prevent a zero-day attack that exploits a zero-day vulnerability? No, but it can help contain it. Let’s clarify any confusion caused by all these “zeros.” Zero…what? The article Stop Zero-Day Attacks With Zero Trust and …

Read more

Mass Tech Layoffs Are a Correction, Not the End of the Tech-Talent Shortage

There’s been a lot of talk about how big tech’s mass layoffs are easing the tech talent shortage. But the facts don’t show any change in the availability of qualified tech talent. Even when you combine all the layoffs over the past 18 months — Google, Meta, Microsoft, Amazon, Twitter, Lyft — the total is not significant …

Read more

Report Highlights Vulnerabilities That Put 30,000 Machines at Risk

Cybersecurity company Forescout has released a report detailing 56 very concerning security gaps they discovered across a string of devices used in industrial equipment, including devices used by manufacturers, distributors, and building automation. The devices were sold by 10 well-established operational technology (OT) vendors, including Honeywell, Ericsson, and Motorola, among others, and included products being …

Read more

Legacy Systems: The Preferred Path for Hacker Attacks

If your company has been relying on one or more legacy systems and they’ve run smoothly for many years, you may think they don’t need much attention — you can continue with SOP. But the opposite may be true. Organizations that fail to update and remediate vulnerabilities in their legacy systems are putting those systems …

Read more

SASE or SSE? There Isn’t a One-Size-Fits-All Approach to Security

In 2019, Gartner Research introduced a new enterprise networking and security category they called secure access service edge (SASE). SASE (pronounced “sassy”) combines a suite of both network and security services into a single, integrated cloud service. By bundling these services together, a single vendor can offer their customers better security and reduce the risk …

Read more