The Importance of Uptime and Performance in Cloud Security

Imagine that you just purchased a brand new car featuring all of the latest bells and whistles. You’re excited to take advantage of speed camera detection and try out the heated seat backs and armrests. Unfortunately, when you go to turn your car on, … Continue reading The Importance of Uptime and Performance in Cloud Security

How to Get the Best Results From ZTNA

The pandemic greatly expanded the work-from-home population. Due to the pandemic, 86% of IT leaders say that at least a quarter of their staff members are connecting to corporate networks through personal and shared devices. But even before the pandem… Continue reading How to Get the Best Results From ZTNA

Is Misinformation Slowing SASE Adoption?

One of the most notable emerging security architectures in 2020 was secure access service edge (SASE), a technology designed to bring SD-WAN and cybersecurity together on the same plane. Much of that recognition was driven by the coronavirus pandemic … Continue reading Is Misinformation Slowing SASE Adoption?

What Most Enterprises Get Wrong About ZTNA

Zero-trust network access, or ZTNA, is a technology that has come into sharper focus thanks to the COVID-19 pandemic. ZTNA has proved critical for securing remote workers that were forced out of the office due to quarantines and the other realities pr… Continue reading What Most Enterprises Get Wrong About ZTNA

2021 Cyber Security Focus: “Unbound”

It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s drivin… Continue reading 2021 Cyber Security Focus: “Unbound”

Edge Computing Growth Drives New Cybersecurity Concerns

Edge computing is proving to be more than just a trend. Research giant Gartner predicts that by 2025, some 75% of enterprise-generated data will be created and processed outside of the traditional data center or cloud. Simply put, the edge is poised t… Continue reading Edge Computing Growth Drives New Cybersecurity Concerns

Gartner and the Top Strategic Technology Trends for 2021

For organizations the world over, COVID-19 led to drastic operational changes overnight. On-premises-only styles of work were quickly supplanted by fully remote workforces. This shift had (and continues to have) massive implications for IT and securit… Continue reading Gartner and the Top Strategic Technology Trends for 2021

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

How MDR Fills SASE and ZTNA Cybersecurity Gaps

The COVID-19 pandemic has forced most enterprises to change how IT operates. However, the rush to adopt new modes of work, such as remote users, work from home users and cloud services, has created numerous cybersecurity concerns. Faulty VPN configura… Continue reading How MDR Fills SASE and ZTNA Cybersecurity Gaps