Avatar photo

Carl Keyser

Inbound Marketing Manager
Integris

As Inbound Marketing Manager at Integris, Carl Keyser brings expertise in digital marketing and SEO to create insightful blog content that educates and informs readers about technology trends and best practices.

What is Host Identity Protocol (HIP)?

HIP is a host identification technology for use on the Internet. HIP separates the end-point identifier and locator roles of IP addresses.

Read More
A bearded person in a sweater stands in front of a blue background with the text Security 7 Introducing... Darrin Maggy, CISSP Our New Practices Manager!.

Introducing Darrin Maggy, our NEW Practice Manager

Integris is happy to introduce Darrin Maggy, our new Practice Manager.

Read More

New Hampshire: It’s Time to Talk about HB 1612

What is New Hampshire HB 1612? New Hampshire House Bill 1612 (HB 1612) requires all public and non-public schools to develop a data security plan to protect students, teachers, and department records from cyberattack.

Read More

Cybersecurity Scorecard: Help Businesses Stay Safe

Could your business be more secure from digital attackers? Register for a FREE Cybersecurity Risk Scorecard today from Integris and take control of your cybersecurity posture.

Read More

Centrify to Spin Off IDaaS Business – Creates Idaptive

Centrify News Update
Big news in the Identity-as-a-Service (IDaaS) world. Centrify has decided to spin off their IDaaS service as a brand new company called Idaptive.

Read More
Four business professionals in formal attire are seated around a table, engaged in a discussion while looking at a laptop screen.

Boardroom Cybersecurity Discussion: Imperative

Cybersecurity discussions belong in the boardroom – It’s essential that senior executives take part in developing a strong cybersecurity solution.

Read More

How to Calculate What a Ransomware Attack ACTUALLY Costs

Factors you should consider when calculating the true cost of a Ransomware attack.

Read More
Abstract digital circuitry design against a deep blue background, with interconnected lines and points representing a technological network.

Positive Security Controls vs. Negative Security Controls*

Positive security controls focus on allowing the known or whitelisted good (i.e. software, scripts, etc) to operate in your environment. Negative security controls focus on blocking the known bad (i.e. malware, viruses, trojans, etc) from operating in your environment & allowing everything else.

Read More

How to Stop a Tech Support Phone Scam

Learn how to spot and how to stop a tech support phone scam.

Read More
Cloudflare logo with an orange cloud icon and the text "CLOUDFLARE" in bold, gray letters.

Cloudflare announces “Spectrum”

Learn more about Spectrum from Cloudflare.

Read More