Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them

With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make malicious traffic appear as trusted cloud traffic.
The post Cloudy with a Chance of Cyberattack: Understanding LOTC Atta… Continue reading Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them

Cloudflare Expands Zero Trust Capabilities with Acquisition of BastionZero

Cloudlfare acquires Boston seed-stage startup BastionZero to bolster its Zero Trust Network Access technology portfolio.
The post Cloudflare Expands Zero Trust Capabilities with Acquisition of BastionZero appeared first on SecurityWeek.
Continue reading Cloudflare Expands Zero Trust Capabilities with Acquisition of BastionZero

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

ZTNA stands out as a solution that enables organizations to minimize their attack surface while ensuring the productivity and security of their remote workforce.
The post Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 appeared fi… Continue reading Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

Password Dependency: How to Break the Cycle

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the password dependency cycle. But how can this be done?

The post Password Dependency: How to Break the Cycle appeared first on SecurityWeek.

Continue reading Password Dependency: How to Break the Cycle