How SASE Can Stop Cyberattackers in Their Tracks

SASE is emerging as a way to defeat cybercriminals by preventing malware from accessing the corporate network Organized crime and criminal groups are increasing the pressure on enterprises in the form of cyberattacks. For most, the pre-eminent tool of… Continue reading How SASE Can Stop Cyberattackers in Their Tracks

Securing Remote Work Part 4: ZTNA

My colleagues Wayne Phillips and Jonathan Andresen recently delivered a webcast titled, “Who moved my VPN and why should I care?” It covers a host of topics related to securing today’s remote workforce, but the title does raise a val… Continue reading Securing Remote Work Part 4: ZTNA

Zero Trust Can Fix Healthcare’s Security Problem

Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks that breached more than 30 million health care … Continue reading Zero Trust Can Fix Healthcare’s Security Problem

Zero Trust Network Access with Bitglass

As the old adage goes, “Trust must be earned.” This proverb essentially means that trusting those who are not truly trustworthy can have harmful results. Interestingly, this wisdom is particularly applicable to cybersecurity. There are cou… Continue reading Zero Trust Network Access with Bitglass

Time for Something New…

Six years ago, we started Safe-T to bring consistency and simplicity to secure access. We knew, back in the early days of the digital transformation, that attackers would use this new opportunity to make their way inside corporate networks at any … Continue reading Time for Something New…

SAFE-T; A Progressive Approach To Zero Trust Access

The foundations that support our systems are built with connectivity and not security as an essential feature. TCP connects before it authenticates. Security policy and user access based on IP lack context and allow architectures that exhibit o… Continue reading SAFE-T; A Progressive Approach To Zero Trust Access