Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks.
The post Authentication: Lessons Learned from Mi… Continue reading Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks. Continue reading Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was quickly followed by the news that a hacktivist "collective" calling itself APT-69420 claims to have breached the internal systems of the Silicon Valley firm Verkada. That particular breach has garnered widespread press coverage as the group claims to have gained access to live video feeds from more than 150,000 surveillance cameras. Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was … Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

Akamai + Fingerbank: How an open source community can transform security

Isn’t it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the inherent value in keeping it as such. In so doing, they didn’t just launch a product–they created a global community. By making a trusted network access control (NAC) solution freely available, they planted the seeds of an ever-growing community of users that now numbers more than 5,000 deployments worldwide and more than 7 million endpoints. Continue reading Akamai + Fingerbank: How an open source community can transform security

Akamai Identified as a Leader Among Zero Trust Providers by Independent Research Firm

We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.
The post Akamai Identified as a Leader Among Zero Trust Providers by Independent Research Firm appear… Continue reading Akamai Identified as a Leader Among Zero Trust Providers by Independent Research Firm

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined — specifically, from the outside in,… Continue reading Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined — specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters. Continue reading Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

Evaluating Internet Isolation Clouds: Must-Have Features

Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.
The post Evaluating Internet Isolation Clouds: Must-Have Features appeared first on Security Boulevard.
Continue reading Evaluating Internet Isolation Clouds: Must-Have Features