The Changing Attack Landscape and Foiling Detection Evasion

Detection-based cybersecurity approaches lock organizations in to frustrating, unending and costly “cat and mouse” games with clever cybercriminals. Break the cycle with Zero Trust defenses that strengthen protection to keep even unknown threats out.
T… Continue reading The Changing Attack Landscape and Foiling Detection Evasion

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

ZTNA and CASB: Combining Key Pieces of the SASE Puzzle

What’s Next for Zero Trust? Everyone in the security industry has been knee-deep in the concept of Zero Trust for some time, and by all appearances, that’s not changing soon.  Since the concept’s inception by Forrester in 2010, the general meaning of Z… Continue reading ZTNA and CASB: Combining Key Pieces of the SASE Puzzle

Applying Enterprise Access Lessons From COVID-19

The pandemic showed that VPNs were no longer the gold standard when it came to network access COVID-19 is impacting our world in many ways. One likely consequence of the pandemic will be an increase in mergers and acquisitions as the strong take over … Continue reading Applying Enterprise Access Lessons From COVID-19

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists. Continue reading How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

Zero Trust Can Fix Healthcare’s Security Problem

Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks that breached more than 30 million health care … Continue reading Zero Trust Can Fix Healthcare’s Security Problem

Zero Trust Trends to Watch Out For in 2020

We all know Zero Trust is the new norm.
The term, along with the model it defines, went from relative obscurity to having “household-name” status (well, if the people in your household work in cyber security, that is) in the span of… Continue reading Zero Trust Trends to Watch Out For in 2020

VPNs—Better Off With ‘Em Or Without ‘Em?

Do VPNs make you more or less secure? 
This is a question many companies found themselves asking in 2019. 
The post VPNs—Better Off With ‘Em Or Without ‘Em? appeared first on Security Boulevard.
Continue reading VPNs—Better Off With ‘Em Or Without ‘Em?