Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be trusted and everything — and everyone &#… Continue reading Building Zero Trust With a Software Defined Perimeter

Software-Defined Perimeter: Moving Beyond Traditional VPNs

Information and applications are moving into the cloud at breakneck speed to support the accessibility requirements of today’s increasingly decentralized enterprise—whether it is a commercial, nonprofit or government agency. Workforces are spread out … Continue reading Software-Defined Perimeter: Moving Beyond Traditional VPNs

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be trusted and everything — and everyone &#… Continue reading Building Zero Trust With a Software Defined Perimeter

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provid… Continue reading What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

VPNs Aren’t Dead, They Just Need to Evolve

Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people authorized to access the company network. As technology continues to evolve, VPNs have held strong as a tried-and-true … Continue reading VPNs Aren’t Dead, They Just Need to Evolve

SWIFT Cyber-Attackers Strike Again – Organizations Must Turn to the Software Defined Perimeter

Cyber-attacks targeting the SWIFT inter-bank transfer system have blighted the financial services industry worldwide over the past two years. Now yet another major attack has been foiled after Malaysia’s central bank blocked an attempted fra… Continue reading SWIFT Cyber-Attackers Strike Again – Organizations Must Turn to the Software Defined Perimeter