Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

ZTNA stands out as a solution that enables organizations to minimize their attack surface while ensuring the productivity and security of their remote workforce.
The post Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 appeared fi… Continue reading Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

Password Dependency: How to Break the Cycle

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the password dependency cycle. But how can this be done?

The post Password Dependency: How to Break the Cycle appeared first on SecurityWeek.

Continue reading Password Dependency: How to Break the Cycle

Zero Trust Product Suites and Enforcement Modes

In this short 15-minute session, you’ll learn about the broad product suite categories such as ZTNA, SASE, SWG, as well as the microsegmentation, and how each solution implements the zero trust security features.

MORE > Click the title to read the … Continue reading Zero Trust Product Suites and Enforcement Modes

Extending the Promise of SASE with MDR 

Managed detection and response (MDR) services have recently gained attention as a way to deal with the growth in cyberthreats. MDR services are often classified as a turnkey solution for businesses looking to reduce response times to detected threats…. Continue reading Extending the Promise of SASE with MDR 

What We Can Learn from the Colonial Pipeline Breach

On June 8, 2021, Joseph Blount, President and Chief Executive Officer of Colonial Pipeline, appeared before the United States Senate Committee on Homeland Security and Governmental Affairs regarding the breach that injected ransomware into their serve… Continue reading What We Can Learn from the Colonial Pipeline Breach