Extending the Promise of SASE with MDR 

Managed detection and response (MDR) services have recently gained attention as a way to deal with the growth in cyberthreats. MDR services are often classified as a turnkey solution for businesses looking to reduce response times to detected threats…. Continue reading Extending the Promise of SASE with MDR 

Remote Work Brings User Complaints and High IT Costs

A recent “Work From Anywhere” survey commissioned by Cato Networks revealed that IT has encountered many unexpected challenges supporting and securing remote users in the wake of the COVID-19 pandemic. The survey, which queried some 2,686 IT leaders, … Continue reading Remote Work Brings User Complaints and High IT Costs

Report Reveals AWS S3 Buckets are Poorly Protected

Research from Lightspin indicates that AWS S3 Buckets are not as secure as many users may think. Lightspin, which specializes in cloud security services, inspected more than 40,000 Amazon S3 buckets and found that improperly configured AWS permissions… Continue reading Report Reveals AWS S3 Buckets are Poorly Protected

Rethinking Networking to Derail Ransomware

Despite the best efforts of many organizations, ransomware attacks are still on the rise; perhaps indicating that those “best efforts” are just not good enough. Take, for example, the recent ransomware attack on the Colonial Pipeline, prompting a shut… Continue reading Rethinking Networking to Derail Ransomware

Cloud Adoption Conflict: Data Privacy vs. Data Science 

A survey conducted by Lead to Market reveals a growing conflict between data scientists and data security professionals. Businesses, in their quest for actionable insights, are pressuring data scientists to accelerate analysis, which requires quick ac… Continue reading Cloud Adoption Conflict: Data Privacy vs. Data Science 

Network Monitoring: The Forgotten Cybersecurity Tool

In a cyber world filled with SIEMs, security appliances and anti-malware products, one would think that the specter of cybersecurity would be well under control. However, attacks are still on the rise, zero-day vulnerabilities are increasing and cyber… Continue reading Network Monitoring: The Forgotten Cybersecurity Tool

Client-Side XSS Vulnerabilities Growing Fast

The COVID-19 pandemic has been a boon to online retailers, as well as cybercriminals, according to a recent report from Tala Security. The report reveals that U.S. retailers’ online year-over-year revenue growth was up 68%, with a 148% growth in all o… Continue reading Client-Side XSS Vulnerabilities Growing Fast

Is Misinformation Slowing SASE Adoption?

One of the most notable emerging security architectures in 2020 was secure access service edge (SASE), a technology designed to bring SD-WAN and cybersecurity together on the same plane. Much of that recognition was driven by the coronavirus pandemic … Continue reading Is Misinformation Slowing SASE Adoption?

What Most Enterprises Get Wrong About ZTNA

Zero-trust network access, or ZTNA, is a technology that has come into sharper focus thanks to the COVID-19 pandemic. ZTNA has proved critical for securing remote workers that were forced out of the office due to quarantines and the other realities pr… Continue reading What Most Enterprises Get Wrong About ZTNA