Why Financial Services Needs Network Transformation

All business industries have seen increasing pressure to digitize their services in recent years, particularly over the past 12 months in response to COVID-19. But few industries have felt this pressure more than the financial sector, where customers … Continue reading Why Financial Services Needs Network Transformation

The Importance of Uptime and Performance in Cloud Security

Imagine that you just purchased a brand new car featuring all of the latest bells and whistles. You’re excited to take advantage of speed camera detection and try out the heated seat backs and armrests. Unfortunately, when you go to turn your car on, … Continue reading The Importance of Uptime and Performance in Cloud Security

Taking Steps Toward an Impactful SASE Architecture

Given the complexity of digitization initiatives for most companies over the last decade, the world has grown acutely aware of how crucial good cybersecurity is for business health. More than ever before, this past year demonstrated that predicting th… Continue reading Taking Steps Toward an Impactful SASE Architecture

Smart IAM: The Key to Seamless Sign-Ons

In a connected, but still remote, world, employees are logging in from countless devices and locations. Behaviors that were once uncommon – like accessing the corporate network on multiple or personal devices – are commonplace today. Driven by the exp… Continue reading Smart IAM: The Key to Seamless Sign-Ons

How to Secure the Home Branch Office

Amid the pandemic, most workforces have shifted to remote work and home offices; essentially, transforming their living rooms into corporate branch offices. From a convenience and health perspective, this has worked well, for the most part. However, t… Continue reading How to Secure the Home Branch Office

How to Get the Best Results From ZTNA

The pandemic greatly expanded the work-from-home population. Due to the pandemic, 86% of IT leaders say that at least a quarter of their staff members are connecting to corporate networks through personal and shared devices. But even before the pandem… Continue reading How to Get the Best Results From ZTNA

No White Flags—the Value of Cyber Innovation at Speed and Scale

The first ‘till-less’ Amazon Fresh store opened in London recently. Download a QR code, shop and leave with everything being charged directly to your Amazon account. Is this something that we have all been dying to do? Perhaps not today, but what … Continue reading No White Flags—the Value of Cyber Innovation at Speed and Scale

Is Misinformation Slowing SASE Adoption?

One of the most notable emerging security architectures in 2020 was secure access service edge (SASE), a technology designed to bring SD-WAN and cybersecurity together on the same plane. Much of that recognition was driven by the coronavirus pandemic … Continue reading Is Misinformation Slowing SASE Adoption?

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was quickly followed by the news that a hacktivist "collective" calling itself APT-69420 claims to have breached the internal systems of the Silicon Valley firm Verkada. That particular breach has garnered widespread press coverage as the group claims to have gained access to live video feeds from more than 150,000 surveillance cameras. Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was … Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool